33. INFOCOM 2014:Toronto, Canada

2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014. IEEE 【DBLP Link

Paper Num: 319 || Session Num: 81

CC1: Cloud Computing 1 4

1. Toward profit-seeking virtual network embedding algorithm via global resource capacity.

Paper Link】 【Pages】:1-9

【Authors】: Long Gong ; Yonggang Wen ; Zuqing Zhu ; Tony Lee

【Abstract】: In this paper, after proposing a novel metric, i.e., global resource capacity (GRC), to quantify the embedding potential of each substrate node, we propose an efficient heuristic virtual network embedding (VNE) algorithm, called as GRC-VNE. The proposed algorithm aims to maximize the revenue and to minimize the cost of the infrastructure provider (InP). Based on GRC, the proposed algorithm applies a greedy load-balance manner to embed each virtual node sequentially, and then adopts the shortest path routing to embed each virtual link. Simulation results demonstrate that our proposed GRC-VNE algorithm achieves lower request blocking probability and higher revenue due to the more appropriate consideration of the resource distribution of the entire network, when compared to the two lastest VNE algorithms that also consider the resources of entire substrate network. Then, we introduce a classical reserved cloud revenue model, which consists of fixed revenue and variable one. Based on this revenue model, we design a novel admission control policy selectively accepting the VNR with high revenue-to-cost ratio to maximize the InP's profit based on an empirical threshold. Through extensive simulations, we observe that the optimal empirical threshold is proportional to the ratio of variable revenue to the fixed one.

【Keywords】: cloud computing; cost reduction; greedy algorithms; profitability; resource allocation; telecommunication network routing; virtual private networks; GRC-VNE algorithm; InP; admission control policy; global resource capacity; greedy load-balancing; heuristic virtual network embedding algorithm; infrastructure provider cost minimization; profit-seeking virtual network embedding algorithm; request blocking probability; reserved cloud revenue model; resource distribution; revenue-to-cost ratio; shortest path routing; substrate network; virtual link; Algorithm design and analysis; Bandwidth; Computational modeling; Computers; Indium phosphide; Substrates; Vectors; Admission policy; GRC-VNE; Global resource capacity (GRC); Network virtualization; Reserved cloud revenue model; Virtual network embedding (VNE)

2. Online allocation of virtual machines in a distributed cloud.

Paper Link】 【Pages】:10-18

【Authors】: Fang Hao ; Murali S. Kodialam ; T. V. Lakshman ; Sarit Mukherjee

【Abstract】: One of the primary functions of a cloud service provider is to allocate cloud resources to users upon request. Requests arrive in real-time and resource placement decisions must be made as and when a request arrives, without any prior knowledge of future arrivals. In addition, when a cloud service provider operates a geographically diversified cloud that consists of large number of small data centers, the resource allocation problem becomes even more complex. This is due to the fact that resource request can have additional constraints on data center location, service delay guarantee, etc. In this paper, we propose a generalized resource placement methodology that can work across different cloud architectures, resource request constraints, with real-time request arrivals and departures. The proposed algorithms are online in the sense that allocations are made without any knowledge of resource requests that arrive in the future, and the current resource allocations are made in such a manner as to permit the acceptance of as many future arrivals as possible. We derive worst case competitive ratio for the algorithms. We show through experiments and case studies the superior performance of the algorithms in practice.

【Keywords】: cloud computing; real-time systems; resource allocation; virtual machines; cloud architectures; cloud resource allocation problem; cloud service provider; data center location; distributed cloud; geographically diversified cloud; online virtual machine allocation; real-time request arrivals; resource placement decisions; resource placement methodology; resource request constraints; Approximation algorithms; Approximation methods; Computers; Conferences; Distributed databases; Resource management; Upper bound

3. HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing.

Paper Link】 【Pages】:19-27

【Authors】: Yang Peng ; Kai Chen ; Guohui Wang ; Wei Bai ; Zhiqiang Ma ; Lin Gu

【Abstract】: This paper presents our effort towards comprehensive traffic forecasting for big data applications using external, light-weighted file system monitoring. Our idea is motivated by the key observations that rich traffic demand information already exists in the log and meta-data files of many big data applications, and that such information can be readily extracted through run-time file system monitoring. As the first step, we use Hadoop as a concrete example to explore our methodology and develop a system called HadoopWatch to predict traffic demand of Hadoop applications. We further implement HadoopWatch in our real small-scale testbed with 10 physical servers and 30 virtual machines. Our experiments over a series of MapReduce applications demonstrate that HadoopWatch can forecast the traffic demand with almost 100% accuracy and time advance. Furthermore, it makes no modification of the Hadoop framework, and introduces little overhead to the application performance.

【Keywords】: Big Data; cloud computing; meta data; parallel programming; public domain software; telecommunication traffic; virtual machines; Big Data applications; HadoopWatch; MapReduce applications; cloud computing; comprehensive traffic demand forecasting; external-light-weighted file system monitoring; information extraction; log files; meta-data files; physical servers; real-small-scale testbed; traffic demand prediction; virtual machines; Big data; Computers; Conferences; Forecasting; Monitoring; Pipelines; Writing

4. Multi-objective data placement for multi-cloud socially aware services.

Paper Link】 【Pages】:28-36

【Authors】: Lei Jiao ; Jun Li ; Wei Du ; Xiaoming Fu

【Abstract】: Socially aware services often have a large user base and data of users have to be partitioned and replicated over multiple geographically distributed clouds. Choosing in which cloud to place data, however, is difficult. Effective data placements entail meeting multiple system objectives, including reducing the usage of cloud resources, providing good service quality to users, and even minimizing the carbon footprint, while facing critical challenges such as the interconnection of social data, the conflicting requirements of different objectives, and the customized multi-cloud data access policies. In this paper, we study multi-objective optimization for placing users' data over multiple clouds for socially aware services. We build a model framework that can accommodate a range of different objectives, and based on this model we formulate the optimization problem. Leveraging graph cuts, we propose an optimization approach that decomposes our original problem into two simpler subproblems and solves them alternately in multiple rounds. We carry out evaluations using a large group of real-world geographically distributed users with realistic interactions, and place users' data over 10 clouds all across the US. We demonstrate results that are significantly superior to standard and de facto methods in all objectives, and also show that our approach is capable of exploring trade-offs among objectives, converges fast and scales to a huge user base.

【Keywords】: cloud computing; graph theory; optimisation; resource allocation; social networking (online); US; carbon footprint minimization; cloud resources; customized multicloud data access policies; geographically distributed clouds; graph cuts; multicloud socially aware services; multiobjective data placement; multiobjective optimization; real-world geographically distributed users; service quality; social data; Carbon; Communities; Computers; Conferences; Data models; Distributed databases; Optimization

LO1: Localization 1 4

5. Near-pri: Private, proximity based location sharing.

Paper Link】 【Pages】:37-45

【Authors】: Edmund Novak ; Qun Li

【Abstract】: As the ubiquity of smartphones increases we see an increase in the popularity of location based services. Specifically, online social networks provide services such as alerting the user of friend co-location, and finding a user's k nearest neighbors. Location information is sensitive, which makes privacy a strong concern for location based systems like these. We have built one such service that allows two parties to share location information privately and securely. Our system allows every user to maintain and enforce their own policy. When one party, (Alice), queries the location of another party, (Bob), our system uses homomorphic encryption to test if Alice is within Bob's policy. If she is, Bob's location is shared with Alice only. If she is not, no user location information is shared with anyone. Due to the importance and sensitivity of location information, and the easily deployable design of our system, we offer a useful, practical, and important system to users. Our main contribution is a flexible, practical protocol for private proximity testing, a useful and efficient technique for representing location values, and a working implementation of the system we design in this paper. It is implemented as an Android application with the Facebook online social network used for communication between users.

【Keywords】: cryptography; mobile computing; smart phones; social networking (online); Android application; Facebook online social network; Near-Pri; homomorphic encryption; location based services; location based systems; location information sensitivity; location value representation; private proximity based location sharing; private proximity testing; smartphone ubiquity; user location information privacy; Cryptography; Facebook; Lead; Polynomials; Privacy; Protocols; Vegetation

6. 3D surface localization with terrain model.

Paper Link】 【Pages】:46-54

【Authors】: Yang Yang ; Miao Jin ; Hongyi Wu

【Abstract】: The majority of current research on sensor network localization focuses on wireless sensor networks deployed on two dimensional (2D) plane or in three dimensional (3D) space, very few on 3D surface. However, many real world applications require large-scale sensor networks deployed on the surface of a complex 3D terrain. Compared with planar and 3D network localizations, surface network localization generates unique and fundamental hardness. In this research, we explore 3D surface network localization with terrain model. A digital terrain model (DTM), available to public with a variable resolution up to one meter, is a 3D representation of a terrain's surface. It is commonly built using remote sensing technology or from land surveying and can be easily converted to a triangular mesh. Given a sensor network deployed on the surface of a 3D terrain with one-hop distance information available, we can extract a triangular mesh from the connectivity graph of the network. The constraint that the sensors must be on the known 3D terrain's surface ensures that the triangular meshes of the network and the DTM of the terrain's surface approximate the same geometric shape and overlap. We propose a fully distributed algorithm to construct a well-aligned mapping between the two triangular meshes. Based on this mapping, each sensor node of the network can easily locate reference grid points from the DTM to calculate its own geographic location. We carry out extensive simulations under various scenarios to evaluate the overall performance of the proposed localization algorithm. We also discuss the possibility of 3D surface network localization with mere connectivity and the results are promising.

【Keywords】: terrain mapping; wireless sensor networks; 3D network localizations; 3D surface localization; DTM; complex 3D terrain; connectivity graph; digital terrain model; distributed algorithm; planar localizations; remote sensing technology; sensor network localization; terrain surface; triangular mesh; variable resolution; wireless sensor networks; Computers; Conformal mapping; Face; Measurement; Shape; Surface topography; Three-dimensional displays

7. Towards ubiquitous indoor localization service leveraging environmental physical features.

Paper Link】 【Pages】:55-63

【Authors】: Yang Tian ; Ruipeng Gao ; Kaigui Bian ; Fan Ye ; Tao Wang ; Yizhou Wang ; Xiaoming Li

【Abstract】: Mainstream indoor localization technologies rely on RF signatures that require extensive human efforts to measure and periodically re-calibrate. Although recent crowdsourcing based work has started to address the issue, incentives are still lacking for wide user adoption. Thus the progress to ubiquitous localization remains slow. In this paper, we explore an alternative approach that leverages environmental physical features such as store logos or wall posters. A user uses a smartphone to obtain relative position measurements to such static reference points for the system to triangulate the user location. We study the principle of such localization, determine the suitable sensor, and devise guidelines for the user to choose reference points for better accuracy. To enable fast deployment, we propose a lightweight site survey method for service providers to quickly estimate the coordinates of reference points. We incorporate and enhance image matching algorithms with a heuristic technique to automatically identify chosen reference points at high accuracy. Extensive experiments have shown that the prototype achieves 4-5m accuracy at 80-percentile, comparable to the industry state-of-the-art, while covering a 150×75m mall and 300×200m train station requires a one time investment of only 2-3 man-hours from service providers.

【Keywords】: image matching; indoor radio; smart phones; RF signature; environmental physical features; heuristic technique; image matching algorithm; lightweight site survey method; smartphone; ubiquitous indoor localization service; Accuracy; Compass; Computers; Conferences; Gyroscopes; IEEE 802.11 Standards; Position measurement

8. Suave: Swarm underwater autonomous vehicle localization.

Paper Link】 【Pages】:64-72

【Authors】: Jun Liu ; Zhaohui Wang ; Zheng Peng ; Jun-Hong Cui ; Lance Fiondella

【Abstract】: Swarms of autonomous underwater vehicles (AUVs) forming mobile underwater networks often operate in moving currents, which introduce severe turbulence that interferes with coordinated and stealthy navigation of fleet. Therefore, individual AUV must adjust their heading whenever needed to ensure it can reach a pre-determined destination. To achieve accurate navigation, AUVs must maintain precise knowledge of their locations. This paper develops the “Suave” (Swarm underwater autonomous vehicle localization) algorithm to localize swarms of AUVs operating in rough waters. The purpose of Suave is to ensure that all AUVs arrive at their destinations by preserving localization throughout the entire mission. Suave lowers the probability that an AUV swarm is detected by reducing the number of occasions that vehicles must surface to obtain accurate location information from external sources such as satellites. The Suave algorithm also achieves better energy conservation through improved control of localization reference messages. Simulations show Suave significantly improves localization accuracy, lowers energy consumption, and the probability of swarm detection.

【Keywords】: autonomous underwater vehicles; probability; swarm intelligence; AUV swarm; Suave algorithm; autonomous underwater vehicles; coordinated navigation; localization reference messages; location information; mobile underwater networks; moving currents; predetermined destination; rough waters; stealthy navigation; swarm detection probability; swarm underwater autonomous vehicle localization algorithm; turbulence; Accuracy; Acoustics; Computers; Conferences; Navigation; Uncertainty; Vehicles

MN1: Multimedia networking 1 4

9. Robust uncoded video transmission over wireless fast fading channel.

Paper Link】 【Pages】:73-81

【Authors】: Hao Cui ; Chong Luo ; Chang Wen Chen ; Feng Wu

【Abstract】: This research studies robust uncoded video transmission over wireless fast fading channel, where only statistical channel state information (CSI) is available at the transmitter. We observe that increasing channel diversity for high priority (HP) data is essential to improving the robustness of video transmission in fading channels. By utilizing the noise and loss resilient nature of video, we find it possible to design a more robust system by re-allocating the power and channel uses among HP and LP (low priority) data. With total power and channel use constraints, we derive an optimal resource allocation scheme under the squared error distortion criterion. In particular, we first propose a new power allocation algorithm at given channel allocation. Second, based on the proposed power allocation algorithm, we design a channel allocation algorithm to strike the tradeoff between the diversity increase of HP data and the information loss of LP data. Third, under known noise power distribution, we derive the optimal resource allocation for uncoded video multicast. Simulations show that the proposed system achieves 2dB and 5dB gain in average and outage PSNR over Softcast in video unicast, and around 1.4dB and 4dB gain in multicast.

【Keywords】: channel allocation; fading channels; resource allocation; statistical analysis; video communication; CSI; HP data; LP data; PSNR; Softcast; channel allocation algorithm; channel use constraints; gain 2 dB; gain 5 dB; high priority data; information loss; low priority data; noise power distribution; optimal resource allocation scheme; power allocation algorithm; robust uncoded video transmission; squared error distortion criterion; statistical channel state information; total power constraints; transmitter; uncoded video multicast transmission; wireless fast fading channel; Channel allocation; Conferences; Discrete cosine transforms; Noise; Rayleigh channels; Resource management

10. NOVA: QoE-driven optimization of DASH-based video delivery in networks.

Paper Link】 【Pages】:82-90

【Authors】: Vinay Joseph ; Gustavo de Veciana

【Abstract】: We consider the problem of optimizing video delivery for a network supporting video clients streaming stored video. Specifically, we consider the joint optimization of network resource allocation and video quality adaptation. Our objective is to fairly maximize video clients' Quality of Experience (QoE) realizing tradeoffs among the mean quality, temporal variability in quality, and fairness, incorporating user preferences on rebuffering and cost of video delivery. We present a simple asymptotically optimal online algorithm, NOVA, to solve the problem. NOVA is asynchronous, and using minimal communication, distributes the tasks of resource allocation to network controller, and quality adaptation to respective video clients. Video quality adaptation in NOVA is also optimal for standalone video clients, and is well suited for use in the DASH framework. Further, NOVA can be extended for use with more general QoE models, networks shared with other traffic loads and networks using fixed/legacy resource allocation.

【Keywords】: hypermedia; optimisation; quality of experience; radio networks; resource allocation; telecommunication traffic; video streaming; DASH framework; DASH-based video delivery optimization; NOVA; QoE-driven optimization; dynamic adaptive streaming over HTTP; fixed-legacy resource allocation; mean quality; minimal communication; network controller; network optimization for video adaptation; network resource allocation optimization; quality of experience; rebuffering; simple asymptotically optimal online algorithm; supporting video clients streaming; temporal variability; tradeoffs; traffic loads; video client maximization; video delivery cost; video quality adaptation optimization; Computers; Conferences; Optimization; Quality assessment; Resource management; Streaming media; Video recording

11. Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming.

Paper Link】 【Pages】:91-99

【Authors】: Zhi Wang ; Lifeng Sun ; Chuan Wu ; Wenwu Zhu ; Shiqiang Yang

【Abstract】: Dynamic adaptive video streaming has emerged as a popular approach for video streaming in today's Internet. To date the two important components in dynamic adaptive streaming, video transcoding which generates the adaptive bitrates of a video and video delivery which streams the videos to users, have been separately studied, resulting in a huge waste of computation and storage resource due to transcoding useless videos and suboptimal streaming quality due to homogeneous video replication. In this paper, we propose to jointly perform video transcoding and video delivery for adaptive streaming in an online manner. We conduct extensive measurement studies of a video sharing system and a CDN to motivate our design. We formulate and solve optimization problems to enable high streaming quality for the users, and low computation and replication costs for the system. In particular, our design connects video transcoding and video delivery based on users' preferences of CDN regions and regional preferences of video versions. Extensive trace-driven experiments further confirm the superiority of our design.

【Keywords】: Internet; optimisation; video coding; video streaming; CDN; Internet; dynamic adaptive video streaming; geodistributed video delivery; joint online transcoding; optimization problems; storage resource; suboptimal streaming quality; video sharing system; video transcoding; Availability; Bandwidth; Bit rate; Joints; Servers; Streaming media; Transcoding

Paper Link】 【Pages】:100-108

【Authors】: Randeep Bhatia ; T. V. Lakshman ; Arun N. Netravali ; Krishan K. Sabnani

【Abstract】: The rapid growth in multimedia traffic is straining mobile networks thus necessitating the need for efficient content delivery mechanisms. In this paper we present the design and analysis of a scheme for streaming non-live, pre-recorded content (e.g. Video on Demand) that opportunistically takes advantage of the “slow fading” variations in the wireless link quality. The proposed scheme works by selectively sending more content to sessions at times when they have better link quality while providing sufficient rate guarantees to keep their buffers from under-flowing. We establish analytically that the performance of such scheme is within two times that of any optimal scheme and that it results in throughput gains, per user and aggregate, that increase in proportion to the number of streaming users. Our performance evaluations indicate that by exploiting slow time-varying channels the streaming capacity can more than double with significant benefits to the users at the edge of the cell.

【Keywords】: cache storage; mobile radio; radio links; scheduling; telecommunication traffic; time-varying channels; video streaming; client caches; content delivery mechanisms; link aware scheduling; mobile networks; mobile video streaming; multimedia traffic; time-varying channels; wireless link quality; Aggregates; Computer architecture; Data transfer; Fading; Mobile communication; Streaming media; Throughput

NE1: Network economics and pricing 1 4

13. PROMISE: A framework for truthful and profit maximizing spectrum double auctions.

Paper Link】 【Pages】:109-117

【Authors】: Dejun Yang ; Xiang Zhang ; Guoliang Xue

【Abstract】: Auctions provide a platform for licensed spectrum users to trade their underutilized spectrum with unlicensed users. Existing spectrum auctions either do not apply to the scenarios where multiple sellers and buyers both make offers, or assume the knowledge of the users' valuation distribution for maximizing the profit of the auction. To fill this void, we design PROMISE, a framework for spectrum double auctions, which jointly considers spectrum reusability, truthfulness, and profit maximization without the distribution knowledge. We propose a novel technique, called cross extraction, to compute the bid representing a group of secondary users, who can share a common channel. We prove that PROMISE is computationally efficient, individual-rational, and truthful. In addition, PROMISE is guaranteed to achieve an approximate profit of the optimal auction.

【Keywords】: radio spectrum management; PROMISE framework; cross extraction; licensed spectrum users; optimal auction; profit maximization; spectrum double auctions; spectrum reusability; truthfulness; Approximation methods; Computers; Conferences; Cost accounting; Resource management; Silicon; Vectors

14. Dynamic pricing and profit maximization for the cloud with geo-distributed data centers.

Paper Link】 【Pages】:118-126

【Authors】: Jian Zhao ; Hongxing Li ; Chuan Wu ; Zongpeng Li ; Zhizhong Zhang ; Francis C. M. Lau

【Abstract】: Cloud providers often choose to operate datacenters over a large geographic span, in order that users may be served by resources in their proximity. Due to time and spatial diversities in utility prices and operational costs, different datacenters typically have disparate charges for the same services. Cloud users are free to choose the datacenters to run their jobs, based on a joint consideration of monetary charges and quality of service. A fundamental problem with significant economic implications is how the cloud should price its datacenter resources at different locations, such that its overall profit is maximized. The challenge escalates when dynamic resource pricing is allowed and long-term profit maximization is pursued. We design an efficient online algorithm for dynamic pricing of VM resources across datacenters in a geo-distributed cloud, together with job scheduling and server provisioning in each datacenter, to maximize the profit of the cloud provider over a long run. Theoretical analysis shows that our algorithm can schedule jobs within their respective deadlines, while achieving a time-average overall profit closely approaching the offline maximum, which is computed by assuming that perfect information on future job arrivals are freely available. Empirical studies further verify the efficacy of our online profit maximizing algorithm.

【Keywords】: cloud computing; computer centres; optimisation; pricing; profitability; quality of service; scheduling; cloud providers; cloud users; datacenter resources; dynamic VM resource pricing; dynamic pricing; dynamic resource pricing; geo-distributed cloud; geo-distributed data centers; job scheduling; long-term profit maximization; monetary charges; online algorithm; online profit maximizing algorithm; operational costs; quality of service; spatial diversities; time diversities; utility prices; Algorithm design and analysis; Delays; Dynamic scheduling; Heuristic algorithms; Optimization; Pricing; Servers

15. Profit-maximizing incentive for participatory sensing.

Paper Link】 【Pages】:127-135

【Authors】: Tie Luo ; Hwee-Pink Tan ; Lirong Xia

【Abstract】: We design an incentive mechanism based on all-pay auctions for participatory sensing. The organizer (principal) aims to attract a high amount of contribution from participating users (agents) while at the same time lowering his payout, which we formulate as a profit-maximization problem. We use a contribution-dependent prize function in an environment that is specifically tailored to participatory sensing, namely incomplete information (with information asymmetry), risk-averse agents, and stochastic population. We derive the optimal prize function that induces the maximum profit for the principal, while satisfying strict individual rationality (i.e., strictly have incentive to participate at equilibrium) for both risk-neutral and weakly risk-averse agents. The thus induced profit is demonstrated to be higher than the maximum profit induced by constant (yet optimized) prize. We also show that our results are readily extensible to cases of risk-neutral agents and deterministic populations.

【Keywords】: electronic commerce; incentive schemes; optimisation; all-pay auctions; contribution-dependent prize function; information asymmetry; participatory sensing; profit-maximizing incentive; risk-neutral agents; stochastic population; weakly risk-averse agents; Bayes methods; Conferences; Games; Sensors; Sociology; Standards; Statistics; Bayesian game; Mechanism design; all-pay auction; crowdsensing; network economics; perturbation analysis

16. Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.

Paper Link】 【Pages】:136-144

【Authors】: Xukai Zou ; Huian Li ; Yan Sui ; Wei Peng ; Feng Li

【Abstract】: E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated with many existing e-voting techniques is the lack of transparency, leading to the failure to deliver voter assurance. In this work, we propose an assurable, transparent, and mutual restraining e-voting protocol that exploits the existing two-party political dynamics in the US. The proposed e-voting protocol consists of three original technical contributions - universal verifiable voting vector, forward and backward mutual lock voting, and in-process check and enforcement - that, in combination, resolves the apparent conflicts in voting such as anonymity vs. accountability and privacy vs. verifiability. Especially, the trust is split equally among tallying authorities who have conflicting interests and will technically restrain each other. The voting and tallying processes are transparent to voters and any third party, which allow any voter to verify that his vote is indeed counted and also allow any third party to audit the tally.

【Keywords】: data privacy; government data processing; protocols; E-voting systems; E-voting techniques; anonymity; backward mutual lock voting; forward mutual lock voting; multiple conflicting parties; mutual restraining e-voting protocol; mutual restraining voting; political Parties; privacy verifiability; tallying processes; transparency; universal verifiable voting vector; voter assurance; voting processes; Casting; Computers; Cryptography; Electronic voting; Privacy; Protocols; Vectors; Anonymity; Assurance; E-voting; Mutual restraining voting; Privacy; Transparency; Verifiability

RF1: RFID 1 4

17. Efficiently collecting histograms over RFID tags.

Paper Link】 【Pages】:145-153

【Authors】: Lei Xie ; Hao Han ; Qun Li ; Jie Wu ; Sanglu Lu

【Abstract】: Collecting histograms over RFID tags is an essential premise for effective aggregate queries and analysis in large-scale RFID-based applications. In this paper we consider efficient collection of histograms from the massive number of RFID tags without the need to read all tag data. We first consider the problem of basic histogram collection and propose an efficient algorithm based on the idea of ensemble sampling. We further consider the problems of advanced histogram collection, respectively, with an iceberg query and a top-k query. Efficient algorithms are proposed to tackle the above problems such that the qualified/unqualified categories can be quickly identified. Experiment results indicate that our ensemble sampling-based solutions can achieve a much better performance than the basic estimation/identification schemes.

【Keywords】: radiofrequency identification; sampling methods; sea ice; RFID tags; effective aggregate queries; efficient algorithm; ensemble sampling-based solutions; estimation-identification schemes; histogram efficient collection; iceberg query; large-scale RFID-based applications; qualified-unqualified categories; tag data; top-k query; Accuracy; Histograms; Protocols; RFID tags; Sociology; Algorithms; Histogram; RFID; Time efficiency

18. A Parallel Identification Protocol for RFID systems.

Paper Link】 【Pages】:154-162

【Authors】: Linghe Kong ; Liang He ; Yu Gu ; Min-You Wu ; Tian He

【Abstract】: Nowadays, RFID systems have been widely deployed for applications such as supply chain management and inventory control. One of their most essential operations is to swiftly identify individual tags to distinguish their associated objects. Most existing solutions identify tags sequentially in the temporal dimension to avoid signal collisions, whose performance degrades significantly as the system scale increases. In this paper, we propose a Parallel Identification Protocol (PIP) for RFID systems, which achieves the parallel identification paradigm and is compatible with current RFID devices. Uniquely, PIP encodes the tag ID into a specially designed pattern and thus greatly facilitates the reader to correctly and effectively recover them from collisions. Furthermore, we analytically investigate its performance and provide guidance on determining its optimal settings. Extensive simulations show that PIP reduces the identification delay by about 25%-50% when compared with the standard method in EPC C1G2 and the state-of-the-art solutions.

【Keywords】: encoding; protocols; radiofrequency identification; telecommunication congestion control; EPC C1G2; PIP; RFID device compatibility; identification delay reduction; individual tag identification; inventory control; optimal setting; parallel identification protocol; radio frequency identification; signal collision avoidance; supply chain management; temporal dimension; Computers; Conferences; Delays; Encoding; Protocols; Radiofrequency identification; Standards

19. Efficient distributed query processing in large RFID-enabled supply chains.

Paper Link】 【Pages】:163-171

【Authors】: Jia Liu ; Bin Xiao ; Kai Bu ; Lijun Chen

【Abstract】: Radio Frequency Identification (RFID) has dramatically streamlined supply chain management by automatically monitoring and tracking commodities. Considering the proliferation of RFID data volume, distributed storage is more applicable and scalable than centralized storage for distributed query processing. Traditional distributed RFID data storage requires each distribution center to locally store raw RFID data, leading to data redundancy, storage and query inefficiency. In this paper, we design an efficient distributed storage model by leveraging Bloom filters to save storage space and improve query efficiency. Meanwhile, we establish corresponding query processing schemes to locally support existence queries and path queries, which are two kinds of most popular queries in the supply chain management. A local query can be completed with constant time complexity regardless of data volume. Experiments demonstrate that our storage model outperforms the traditional one in terms of both space and time efficiency.

【Keywords】: data structures; monitoring; query processing; radiofrequency identification; supply chain management; Bloom filters; RFID; commodities monitoring; commodities tracking; distributed query processing; distributed storage; radio frequency identification; supply chain management; Accuracy; Data models; Distributed databases; Memory; Query processing; Radiofrequency identification; Supply chains

20. Pandaka: A lightweight cipher for RFID systems.

Paper Link】 【Pages】:172-180

【Authors】: Min Chen ; Shigang Chen ; Qingjun Xiao

【Abstract】: The ubiquitous use of RFID tags raises concern about potential security risks in RFID systems. Because low-cost tags are extremely resource-constrained devices, common security mechanisms adopted in resource-rich equipment such as computers are no longer applicable to them. Hence, one challenging research topic is to design a lightweight cipher that is suitable for low-cost RFID tags. Traditional cryptography generally assumes that the two communicating parties are equipotent entities. In contrast, there is a large capability gap between readers and tags in RFID systems. We observe that the readers, which are much more powerful, should take more responsibility in RFID cryptographic protocols. In this paper, we make a radical shift from traditional cryptography, and design a novel cipher called Pandaka1, in which most workload is pushed to the readers. As a result, Pandaka is particularly hardware-efficient for tags. We perform extensive simulations to evaluate the effectiveness of Pandaka. In addition, we present security analysis of Pandaka facing different attacks.

【Keywords】: cryptographic protocols; radiofrequency identification; telecommunication security; Pandaka security analysis; RFID cryptographic protocols; RFID systems; lightweight cipher; low-cost RFID tags; resource-constrained devices; resource-rich equipment; security mechanisms; security risks; Ciphers; Computers; Indexes; Radiofrequency identification; Servers

RS: Router and switch design 4

21. Multi-Terabyte and multi-Gbps information centric routers.

Paper Link】 【Pages】:181-189

【Authors】: Giuseppe Rossini ; Dario Rossi ; Michele Garetto ; Emilio Leonardi

【Abstract】: One of the main research directions along which the future Internet is evolving can be identified in the paradigmatic shift from a network of hosts toward a network of caches. Yet, several questions remain concerning the scalability of individual algorithms (e.g., name based lookup and routing) and components (e.g., caches) of these novel Information Centric Networking (ICN) architectures. Exploiting a peculiar characteristics of ICN (i.e., the fact that contents are split in chunks), and the nature of video streaming (which dominates Internet traffic), this paper proposes a novel two-layers caching scheme that allows multi-Terabyte caches to sustain content streaming at multi-Gbps speed. We model the system as an extension, to the case of chunked contents, of the well known Che approximation, that has the advantage of being very simple and accurate at the same time. Simulations under synthetic and realistic trace-driven traffic confirm the accuracy of the analysis and the feasibility of the proposed architecture.

【Keywords】: cache storage; computer networks; telecommunication network routing; video streaming; Che approximation; content streaming; future Internet; information centric networking; information centric router; multigigabit per second router; multiterabyte cache; multiterabyte router; paradigmatic shift; trace driven traffic; two layer caching; video streaming; Aggregates; Catalogs; Computer architecture; Indexes; Prefetching; Random access memory; Streaming media

22. Towards zero-time wakeup of line cards in power-aware routers.

Paper Link】 【Pages】:190-198

【Authors】: Tian Pan ; Ting Zhang ; Junxiao Shi ; Yang Li ; Linxiao Jin ; Fuliang Li ; Jiahai Yang ; Beichuan Zhang ; Bin Liu

【Abstract】: As the network infrastructure has been consuming more and more power, various schemes have been proposed to improve power efficiency of network devices. Many schemes put links to sleep when idle and wake them up when needed. A presumption in these schemes, though, is that router's line cards can be waken up quickly. However, through systematic measurement of a major vender's high-end router, we find that it takes minutes to get a line card ready under the current implementation. To address this issue, we propose a new line card design that (1) keeps the host processor in a line card always up, which only consumes a small fraction of power, and (2) downloads a slim slot of popular prefixes with higher priority, so that the line card will be ready for forwarding most of the traffic much earlier. We design algorithms that ensure fast and correct longest prefix match lookup during prioritized routing prefix download. Experiments on real hardware show that the wakeup time can be reduced to 127.27ms, which is 0.3% of the original line card wakeup time, well supporting many power-saving schemes.

【Keywords】: telecommunication network routing; telecommunication power management; high-end router; line card design; line card wakeup time; network devices; network infrastructure; power-aware routers; power-saving schemes; routing prefix download; systematic measurement; traffic; zero-time wakeup; Computers; Conferences; Fabrics; Hardware; Power supplies; Routing; Routing protocols

23. Safe routing reconfigurations with route redistribution.

Paper Link】 【Pages】:199-207

【Authors】: Stefano Vissicchio ; Laurent Vanbever ; Luca Cittadini ; Geoffrey G. Xie ; Olivier Bonaventure

【Abstract】: Simultaneously providing flexibility, evolvability and correctness of routing is one of the basic and still unsolved problems in networking. Route redistribution provides a tool, used in many enterprise networks, to either partition a network into multiple routing domains or merge previously independent networks. However, no general technique exists for changing a live network's route redistribution configuration without incurring packet losses and service disruptions. In this paper, we study the problem of how to safely transition between route redistribution configurations. We investigate what anomalies may occur in the reconfiguration process, showing that many long-lasting forwarding loops can and do occur if naive techniques are applied. We devise new sufficient conditions for anomaly-free reconfigurations, and we leverage them to build provably safe and practical reconfiguration procedures. Our procedures enable seamless network re-organizations to accomplish both short-term objectives, such as local repair or traffic engineering, and long-term requirement changes.

【Keywords】: telecommunication network routing; traffic engineering computing; packet losses; route redistribution; safe routing reconfigurations; service disruptions; traffic engineering; Computers; Conferences; Network topology; Routing; Routing protocols; Topology

24. Scalable forwarding tables for supporting flexible policies in enterprise networks.

Paper Link】 【Pages】:208-216

【Authors】: Shu Yang ; Mingwei Xu ; Dan Wang ; Gautier Bayzelon ; Jianping Wu

【Abstract】: With increasing demands for more flexible services, the routing policies in enterprise network becomes much richer. This has placed a heavy burden to the current router forwarding plane to support the increasing number of policies, primarily due to the limited capacity in TCAM. This hinders the development of new network services. In this paper, we present the design and implementation of a new forwarding table structure. It separates the functions of TCAM and SRAM and maximally utilizes the large & flexible SRAM. We progressively design a set of schemes, to maintain correctness, compress storage, and achieve line-card speeds. We also design incremental update algorithms that bring less accesses to memory. We present implementation designs and evaluate our scheme with a real implementation on a commercial router using real data sets. Our design does not require new devices. The evaluation results show that the performance of our forwarding tables is promising.

【Keywords】: SRAM chips; business communication; content-addressable storage; data compression; telecommunication network routing; SRAM; TCAM; correctness maintenance; enterprise networks; flexible policies; incremental update algorithms; line-card speeds; router forwarding plane; routing policies; scalable forwarding table structure; storage compression; Conferences; Field programmable gate arrays; Hardware; Indexes; Pipeline processing; Random access memory; Routing

SP1: Security and privacy 1 4

25. Learning in hide-and-seek.

Paper Link】 【Pages】:217-225

【Authors】: Qingsi Wang ; Mingyan Liu

【Abstract】: Existing work on pursuit-evasion problems typically either assumes stationary or heuristic behavior of one side and examines countermeasures of the other, or assumes both sides to be strategic which leads to a game theoretical framework. Results from the former may lack robustness against changes in the adversarial behavior, while those from the latter are often difficult to justify due to the implied full information (either as realizations or as distributions) and rationality, both of which may be limited in practice. In this paper, we take a different approach by assuming an intelligent pursuer/evader that is adaptive to the information available to it and is capable of learning over time with performance guarantee. Within this context we investigate two cases. In the first case we assume either the evader or the pursuer is aware of the type of learning algorithm used by the opponent, while in the second case neither side has such information and thus must try to learn. We show that the optimal policies in the first case have a greedy nature, hiding/seeking in the location that the opponent is the least/most likely to appear. This result is then used to assess the performance of the learning algorithms that both sides employ in the second case, which is shown to be mutually optimal and there is no loss for either side compared to the case when it completely knows the adaptive pattern used by the adversary and responses optimally.

【Keywords】: game theory; learning (artificial intelligence); adaptive pattern; adversarial behavior; game theoretical framework; greedy nature; hide-and-seek; intelligent pursuer-evader; learning algorithm; optimal policies; performance guarantee; pursuit-evasion problems; Adaptation models; Computational modeling; Computers; Conferences; Context; Games; Probabilistic logic

Paper Link】 【Pages】:226-234

【Authors】: Wenhai Sun ; Shucheng Yu ; Wenjing Lou ; Y. Thomas Hou ; Hui Li

【Abstract】: Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before-outsourcing is a fundamental solution to protecting user data privacy in the untrusted cloud server environment. Many secure search schemes have been focusing on the single-contributor scenario, where the outsourced dataset or the secure searchable index of the dataset are encrypted and managed by a single owner, typically based on symmetric cryptography. In this paper, we focus on a different yet more challenging scenario where the outsourced dataset can be contributed from multiple owners and are searchable by multiple users, i.e. multi-user multi-contributor case. Inspired by attribute-based encryption (ABE), we present the first attribute-based keyword search scheme with efficient user revocation (ABKS-UR) that enables scalable fine-grained (i.e. file-level) search authorization. Our scheme allows multiple owners to encrypt and outsource their data to the cloud server independently. Users can generate their own search capabilities without relying on an always online trusted authority. Fine-grained search authorization is also implemented by the owner-enforced access policy on the index of each file. Further, by incorporating proxy re-encryption and lazy re-encryption techniques, we are able to delegate heavy system update workload during user revocation to the resourceful semi-trusted cloud server. We formalize the security definition and prove the proposed ABKS-UR scheme selectively secure against chosen-keyword attack. Finally, performance evaluation shows the efficiency of our scheme.

【Keywords】: authorisation; cloud computing; cryptography; data privacy; information retrieval; trusted computing; ABE; ABKS-UR scheme; always online trusted authority; attribute-based encryption; attribute-based keyword search; chosen-keyword attack; cloud computing; cloud server environment; data privacy; encryption; encryption-before-outsourcing; fine-grained owner-enforced search authorization; lazy re-encryption technique; owner-enforced access policy; proxy re-encryption technique; resourceful semi-trusted cloud server; searchable index; security definition; single-contributor search scenario; symmetric cryptography; user revocation; Authorization; Data privacy; Encryption; Indexes; Keyword search; Servers

27. Will cyber-insurance improve network security? A market analysis.

Paper Link】 【Pages】:235-243

【Authors】: Ranjan Pal ; Leana Golubchik ; Konstantinos Psounis ; Pan Hui

【Abstract】: Recent work in security has illustrated that solutions aimed at detection and elimination of security threats alone are unlikely to result in a robust cyberspace. As an orthogonal approach to mitigating security problems, some have pursued the use of cyber-insurance as a suitable risk management technique. Such an approach has the potential to jointly align with the incentives of security vendors (e.g., Symantec, Microsoft, etc.), cyber-insurers (e.g., ISPs, cloud providers, security vendors, etc.), regulatory agencies (e.g., government), and network users (individuals and organizations), in turn paving the way for comprehensive and robust cyber-security mechanisms. To this end, in this work, we are motivated by the following important question: can cyber-insurance really improve the security in a network? To address this question, we adopt a market-based approach. Specifically, we analyze regulated monopolistic and competitive cyber-insurance markets, where the market elements consist of risk-averse cyber-insurers, risk-averse network users, a regulatory agency, and security vendors. Our results show that (i) without contract discrimination amongst users, there always exists a unique market equilibrium for both market types, but the equilibrium is inefficient and does not improve network security, and (ii) in monopoly markets, contract discrimination amongst users results in a unique market equilibrium that is efficient, which in turn results in network security improvement - however, the cyber-insurer can make zero expected profits. The latter fact is often sufficient to de-incentivize the insurer to be a part of a market, and will eventually lead to its collapse. This fact also emphasizes the need for designing mechanisms that incentivize the insurer to permanently be part of the market.

【Keywords】: computer network security; insurance; monopoly; risk management; ISPs; cloud providers; competitive cyber-insurance markets; cyber-insurance improve network security problem; cyber-insurers; market analysis; market equilibrium; market-based approach; monopoly markets; network users; orthogonal approach; regulated monopolistic cyber-insurance markets; regulatory agencies; risk management technique; risk-averse cyber-insurers; risk-averse network users; robust cyber-security mechanisms; robust cyberspace; security threats; security vendor incentives; security vendors; Communication networks; Contracts; Equations; Insurance; Investment; Nash equilibrium; Security; cyber-insurance; equilibrium; market; security

28. FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.

Paper Link】 【Pages】:244-252

【Authors】: Jun Shao ; Rongxing Lu ; Xiaodong Lin

【Abstract】: In this paper, we propose a fine-grained privacy-preserving location-based service (LBS) framework, called FINE, for mobile devices. It adopts the data-as-a-service (DaaS) model, where the LBS provider publishes its data to a third party (e.g., cloud server) who executes users' LBS queries. The proposed FINE framework employs a ciphertext-policy anonymous attribute-based encryption technique to achieve fine-grained access control, location privacy, confidentiality of the LBS data and its access policy, and accurate LBS query result while without involving any trusted third party. Moreover, the proposed FINE framework also integrates the transformation key and proxy re-encryption to migrate most of computation-intensive tasks from the LBS provider and users to the cloud server. This property keeps mobile devices away from massive resource-consuming operations. Extensive analysis shows that our proposed FINE framework is secure and highly efficient for mobile devices in terms of computation and communication cost.

【Keywords】: authorisation; cryptography; mobile computing; DaaS model; FINE framework; LBS data; LBS framework; ciphertext-policy anonymous attribute-based encryption technique; data-as-a-service model; fine-grained access control; fine-grained privacy-preserving location-based service framework; location privacy; mobile devices; Access control; Encryption; Mobile handsets; Mobile radio mobility management; Servers

WN1: Wireless networks 1 4

29. Does full-duplex double the capacity of wireless networks?

Paper Link】 【Pages】:253-261

【Authors】: Xiufeng Xie ; Xinyu Zhang

【Abstract】: Full-duplex has emerged as a new communication paradigm and is anticipated to double wireless capacity. Existing studies of full-duplex mainly focused on its PHY layer design, which enables bidirectional transmission between a single pair of nodes. In this paper, we establish an analytical framework to quantify the network-level capacity gain of full-duplex over half-duplex. Our analysis reveals that inter-link interference and spatial reuse substantially reduces full-duplex gain, rendering it well below 2 in common cases. More remarkably, the asymptotic gain approaches 1 when interference range approaches transmission range. Through a comparison between optimal half- and full-duplex MAC algorithms, we find that full-duplex's gain is further reduced when it is applied to CSMA based wireless networks. Our analysis provides important guidelines for designing full-duplex networks. In particular, network-level mechanisms such as spatial reuse and asynchronous contention must be carefully addressed in full-duplex based protocols, in order to translate full-duplex's PHY layer capacity gain into network throughput improvement.

【Keywords】: carrier sense multiple access; interference suppression; radiocommunication; CSMA; MAC algorithms; PHY layer design; asymptotic gain; asynchronous contention; bidirectional transmission; communication paradigm; full-duplex networks; interference range; interlink interference; network-level capacity; network-level mechanisms; spatial reuse; transmission range; wireless capacity; wireless networks; Interference; Lattices; Multiaccess communication; Radio transmitters; Receivers; Throughput; Wireless networks

30. Characterizing the achievable throughput in wireless networks with two active RF chains.

Paper Link】 【Pages】:262-270

【Authors】: Yang Yang ; Bo Chen ; Kannan Srinivasan ; Ness B. Shroff

【Abstract】: Recent breakthroughs in wireless communication show that by using new signal processing techniques, a wireless node is capable of transmitting and receiving simultaneously on the same frequency band by activating both of its RF chains, thus achieving full-duplex communication and potentially doubling the link throughput. However, with two sets of RF chains, one can build a half-duplex multi-input and multi-output (MIMO) system that achieves the same gain. While this gain is the same between a pair of nodes, the gains are unclear when multiple nodes are involved, as in a general network. The key reason is that MIMO and full-duplex have different interference patterns. A MIMO transmission blocks transmissions around its receiver and receptions around its transmitter. A full-duplex bidirectional transmission blocks any transmission around the two communicating nodes, but allows a reception on one RF chain. Thus, in a general network, the requirements for the two technologies could result in potentially different achievable throughput regions. This work investigates the achievable throughput performance of MIMO, full-duplex and their variants that allow simultaneous activation of two RF chains. It is the first work of its kind to precisely characterize the conditions under which these technologies outperform each other for a general network topology under a binary interference model. The analytical results in this paper are validated using software-defined radios.

【Keywords】: MIMO communication; radio networks; software radio; MIMO system; achievable throughput; active RF chain; full duplex bidirectional transmission; full duplex communication; multiple input multiple output system; signal processing technique; software defined radio; wireless communication; wireless network; Interference; MIMO; Multiplexing; Radio frequency; Schedules; Throughput; Wireless communication

31. WiFall: Device-free fall detection by wireless networks.

Paper Link】 【Pages】:271-279

【Authors】: Chunmei Han ; Kaishun Wu ; Yuxi Wang ; Lionel M. Ni

【Abstract】: The world population is in the midst of a unique and irreversible process of aging. Fall, which is one of the major health threats and obstacles to independent living of elders, will aggravate the global pressure in elders' health care and injury rescue. Thus, automatic fall detection is highly in need. Current proposed fall detection systems either need hardware installation or disrupt people's daily life. These limitations make it hard to widely deploy fall detection systems in residential settings. In this work, we analyze the wireless signal propagation model considering human activities influence. We then propose a novel and truly unobtrusive detection method based on the advanced wireless technologies, which we call as WiFall. WiFall employs the time variability and special diversity of Channel State Information (CSI) as the indicator of human activities. As CSI is readily available in prevalent in-use wireless infrastructures, WiFall withdraws the need for hardware modification, environmental setup and worn or taken devices. We implement WiFall on laptops equipped with commercial 802.11n NICs. Two typical indoor scenarios and several layout schemes are examined. As demonstrated by the experimental results, WiFall yielded 87% detection precision with false alarm rate of 18% in average.

【Keywords】: biomedical communication; diversity reception; wireless LAN; CSI; WiFall; automatic fall detection; channel state information; commercial 802.11n NIC; device-free fall detection; residential settings; unobtrusive detection method; wireless networks; wireless signal propagation model; Conferences; Indoor environments; Noise; Receivers; Sensors; Wireless communication; Wireless sensor networks

32. Distributed learning for utility maximization over CSMA-based wireless multihop networks.

Paper Link】 【Pages】:280-288

【Authors】: Hyeryung Jang ; Se-Young Yun ; Jinwoo Shin ; Yung Yi

【Abstract】: Game-theoretic modeling and equilibrium analysis have provided valuable insights into the design of robust local control rules for the individual agents in multi-agent systems, e.g., Internet congestion control, road transportation networks, etc. In this paper, we introduce a non-cooperative MAC (Medium Access Control) game for wireless networks and propose new fully-distributed CSMA (Carrier Sense Multiple Access) learning algorithms that are probably optimal in the sense that their long-term throughputs converge to the optimal solution of a utility maximization problem over the maximum throughput region. The most significant part of our approach lies in introducing a novel cost function in agents' utilities so that the proposed game admits an ordinal potential function with (asymptotically) no price-of-anarchy. The game formulation naturally leads to known game-based learning rules to find a Nash equilibrium, but they are computationally inefficient and often require global information. Towards our goal of fully-distributed operation, we propose new fully-distributed learning algorithms by utilizing a unique property of CSMA that enables each link to estimate its temporary link throughput without message passing for the applied CSMA parameters. The proposed algorithms can be thought as `stochastic approximations' to the standard learning rules, which is a new feature in our work, not prevalent in other traditional game-theoretic approaches. We show that they converge to a Nash equilibrium, which is a utility-optimal point, numerically evaluate their performance to support our theoretical findings and further examine various features such as convergence speed and its tradeoff with efficiency.

【Keywords】: carrier sense multiple access; game theory; learning (artificial intelligence); multi-agent systems; wireless LAN; CSMA learning algorithms; CSMA parameters; Nash equilibrium; carrier sense multiple access learning algorithms; cost function; equilibrium analysis; fully-distributed learning algorithms; game formulation; game-based learning rules; game-theoretic modeling; individual agents; multiagent systems; noncooperative MAC game; noncooperative medium access control game; ordinal potential function; robust local control rules; stochastic approximations; temporary link throughput; utility maximization problem; utility-optimal point; wireless multihop networks; Games; Heuristic algorithms; Interference; Message passing; Multiaccess communication; Schedules; Throughput

CC2: Cloud Computing 2 4

33. Venice: Reliable virtual data center embedding in clouds.

Paper Link】 【Pages】:289-297

【Authors】: Qi Zhang ; Mohamed Faten Zhani ; Maissa Jabri ; Raouf Boutaba

【Abstract】: Cloud computing has become a cost-effective model for deploying online services in recent years. To improve the Quality-of-Service (QoS) of the provisioned services, recently a number of proposals have advocated to provision both guaranteed server and network resources in the form of Virtual Data Centers (VDCs). However, existing VDC scheduling algorithms have not fully considered the reliability aspect of the allocations in terms of (1) hardware failure characteristics on which the service is hosted, and (2) the impact of individual failures on service availability, given the dependencies among the virtual components. To address this limitation, in this paper we present a technique for computing VDC availability that considers heterogeneous hardware failure rates and dependencies among virtual components. We then propose Venice, an availability-aware VDC embedding framework for achieving high VDC availability and low operational costs. Experiments show Venice can significantly improve VDC availability while achieving higher income compared to availability-oblivious solutions.

【Keywords】: cloud computing; computer centres; reliability; virtualisation; QoS; VDC scheduling algorithms; Venice; cloud computing; hardware failure characteristics; heterogeneous hardware failure rates; network resources; online services; operational costs; quality-of-service; reliability; reliable virtual data center embedding; Availability; Bandwidth; Conferences; Hardware; Maintenance engineering; Servers

34. Meeting service level agreement cost-effectively for video-on-demand applications in the cloud.

Paper Link】 【Pages】:298-306

【Authors】: Yuhong Zhao ; Hong Jiang ; Ke Zhou ; Zhijie Huang ; Ping Huang

【Abstract】: Increasingly video-on-demand (VoD) applications have been ported to cloud platforms. Leveraging the elastic resource provisioning of the cloud, it is believed that VoD applications should attain high performance cost-effectively. In this paper we propose an approach that aims to solve the fundamental resource reservation and scheduling problem of configuring the cloud utility to meet SLAs for VoD applications at a modest cost. First, we devise a constraint-based model that describes the relationship among channel placement, user groups' bandwidth allocation, operating costs and QoS constraints. Second, we present a distributed heuristic algorithm, called DREAM, that solves the model and produces a budget solution that reserves and allocates cloud bandwidth, and determines the channel layout among datacenters. Simulations driven by data traces collected from a commercial VoD system demonstrate that DREAM provides much better access locality and data availability than and comparable streaming quality to state-of-the-art solutions at lower cloud operating costs.

【Keywords】: cloud computing; contracts; cost reduction; quality of service; video on demand; DREAM; QoS; VoD; cloud platforms; distributed heuristic algorithm; operating costs; service level agreement; video-on-demand; Availability; Bandwidth; Computers; Conferences; Optimization; Quality of service; Streaming media

35. Beyond the MDS bound in distributed cloud storage.

Paper Link】 【Pages】:307-315

【Authors】: Jian Li ; Tongtong Li ; Jian Ren

【Abstract】: Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, Reed-Solomon code based regenerating codes were developed. The RS code based minimum storage regeneration code (RS-MSR) and the RS code based minimum bandwidth regeneration code (RS-MBR) can achieve the theoretical bounds on the MSR point and the MBR point respectively in code regeneration. They can also maintain the MDS property in code reconstruction. However, in the hostile network where the storage nodes can be compromised and the packets can be tampered with, the storage capacity of the network can be significantly affected. In this paper, we propose a Hermitian code based regenerating (H-MSR) code. We first prove that this code can achieve the theoretical MSR bound. We then propose data regeneration and reconstruction algorithms for the H-MSR code in both error-free network and hostile network. Theoretical evaluation shows that our proposed schemes can detect the erroneous decodings and correct more errors in the hostile network than the RS-MSR code with the same code rate. Our analysis also demonstrates that the proposed H-MSR code has a lower complexity than the RS-MSR code in both code regeneration and code reconstruction.

【Keywords】: Reed-Solomon codes; cloud computing; storage management; H-MSR code; Hermitian code based regenerating code; MBR point; MDS bound; MSR point; RS code based minimum bandwidth regeneration code; RS code based minimum storage regeneration code; RS-MBR; RS-MSR; Reed-Solomon code; cloud computing framework; code reconstruction; distributed cloud storage; error-free network; hostile network; Bandwidth; Cloud computing; Computers; Conferences; Distributed databases; Encoding; Equations; Hermitian code; Reed-Solomon code; error-correction; regenerating code

36. Cooperative repair with minimum-storage regenerating codes for distributed storage.

Paper Link】 【Pages】:316-324

【Authors】: Jun Li ; Baochun Li

【Abstract】: Distributed storage systems store redundant data to tolerate failures of storage nodes and lost data should be repaired when storage nodes fail. A class of MDS codes, called minimum-storage regenerating (MSR) codes, has been designed to optimize bandwidth consumption when repairing one single failure. Compared with repairing failures individually, the cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired. In this paper, we present a new construction of minimum-storage cooperative regenerating (MSCR) codes that repair two failures cooperatively and exactly. We show that given a valid instance of linear exact MSR codes, we are able to construct a corresponding repair procedure to repair any two failures cooperatively with optimal bandwidth consumption, i.e., to construct an instance of exact MSCR codes directly from exact MSR codes. With this connection, we are also able to repair any single failure exactly with MSCR codes.

【Keywords】: codes; storage management; MDS codes; MSCR codes; MSR codes; cooperative repair; distributed storage systems; minimum-storage cooperative regenerating codes; minimum-storage regenerating codes; optimal bandwidth consumption; redundant data; Bandwidth; Computers; Conferences; Distributed databases; Encoding; Maintenance engineering; Vectors

FC: Flow and congestion control 4

37. Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks.

Paper Link】 【Pages】:325-333

【Authors】: Reza Banirazi ; Edmond A. Jonckheere ; Bhaskar Krishnamachari

【Abstract】: A new routing policy, named Heat-Diffusion (HD), is developed for multihop wireless networks subject to stochastic arrivals, time-varying topology, and inter-channel interference, using only current queue congestion and current channel states, without requiring the knowledge of topology and arrivals. Besides throughput optimality, HD minimizes a quadratic routing cost defined by endowing each channel with a cost-factor. It also minimizes average total queue congestion, and so average network delay, within the class of routing policies that base decision only on current queue lengths and current channel states. Further, within this class, HD provides a Pareto optimal tradeoff between average delay and average routing cost, meaning that no policy can improve either one without detriment to the other. Finally, HD fluid limit follows graph combinatorial heat equation that opens a new way to study wireless networks using heat calculus, a very active area of pure mathematics.

【Keywords】: Pareto optimisation; radio networks; radiofrequency interference; stochastic processes; telecommunication network routing; Pareto optimal dynamic routing; current channel states; current queue congestion; graph combinatorial heat equation; heat calculus; heat-diffusion; inter-channel interference; multihop wireless networks; quadratic routing; routing policies; routing policy; stochastic arrivals; time-varying topology; time-varying wireless networks; Delays; Heating; High definition video; Minimization; Routing; Vectors; Wireless networks

38. From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks.

Paper Link】 【Pages】:334-342

【Authors】: Peng-Jun Wan ; Zhu Wang ; Lei Wang ; Zhiguo Wan ; Sai Ji

【Abstract】: Maximum multiflow and maximum concurrent mul-tiflow in multi-channel multi-radio (MC-MR) wireless networks have been well-studied in the literature. They are NP-hard even in single-channel single-radio (SC-SR) wireless networks when all nodes have uniform (and fixed) interference radii and the positions of all nodes are available. While they admit a polynomial-time approximation scheme (PTAS) when the number of channels is bounded by a constant, such PTAS is quite infeasible practically. Other than the PTAS, all other known approximation algorithms, in both SC-SR wireless networks and MC-MR wireless networks, resorted to solve a polynomial-sized linear program (LP) exactly. The scalability of their running time is fundamentally limited by the general-purposed LP solvers. In this paper, we first introduce the concept of interference costs and prices of a path and explore their relations with the maximum (concurrent) multiflow. Then we develop purely combinatorial approximation algorithms which compute a sequence of least interference-cost routing paths along which the flows are routed. These algorithms are faster and simpler, and achieve nearly the same approximation bounds known in the literature.

【Keywords】: approximation theory; combinatorial mathematics; computational complexity; linear programming; radio networks; radiofrequency interference; MC-MR wireless networks; NP-hard problem; combinatorial approximation algorithm; concurrent multiflow; least interference-cost paths; maximum multiflow; multichannel multiradio wireless networks; polynomial-sized linear program; polynomial-time approximation scheme; single-channel single-radio wireless networks; uniform interference radii; Approximation algorithms; Approximation methods; Computers; Interference; Protocols; Schedules; Wireless networks

39. Multirate multicast: Optimal algorithms and implementation.

Paper Link】 【Pages】:343-351

【Authors】: Georgios S. Paschos ; Chih-Ping Li ; Eytan Modiano ; Kostas Choumas ; Thanasis Korakis

【Abstract】: Multirate multicast improves user quality but complicates network optimization. This paper introduces a novel control scheme to dynamically optimize multirate multicast. We present MMT, an adaptive policy which combines differential backlog scheduling and intelligent packet dropping, both based on local information. MMT is shown to maximize network throughput by adapting to changing conditions such as channel quality, network congestion, and device capabilities. Then, we study the problem of per-receiver network utility maximization. To maximize sum utility we propose the MMU policy, an extension of MMT with receiver-end flow control. Under the operation of both policies backlog sizes are deterministically bounded, which provides delay guarantees on delivered packets. An important feature of the proposed scheme is that it does not require source cooperation or centralized calculations. To illustrate its practicality, we present a prototype implementation in the NITOS wireless testbed. Experimental results verify the optimality of the scheme and its low complexity.

【Keywords】: multicast communication; optimisation; packet radio networks; radio networks; radio receivers; MMT; MMU policy; NITOS wireless testbed; differential backlog scheduling; intelligent packet dropping; multirate multicast optimization; network optimization; network throughput maximization; perreceiver network utility maximization; receiver-end flow control; Computers; Conferences; Optimization; Receivers; Streaming media; Throughput; Wireless communication

40. Routing games with progressive filling.

Paper Link】 【Pages】:352-360

【Authors】: Tobias Harks ; Martin Hoefer ; Kevin Schewior ; Alexander Skopalik

【Abstract】: Max-min fairness (MMF) is a widely known approach to a fair allocation of bandwidth to each of the users in a network. This allocation can be computed by uniformly raising the bandwidths of all users without violating capacity constraints. We consider an extension of these allocations by raising the bandwidth with arbitrary and not necessarily uniform time-depending velocities (allocation rates). These allocations are used in a game-theoretic context for routing choices, which we formalize in progressive filling games (PFGs). We present a variety of results for equilibria in PFGs. We show that these games possess pure Nash and strong equilibria. While computation in general is NP-hard, there are polynomial-time algorithms for prominent classes of Max-Min-Fair Games (MMFG), including the case when all users have the same source-destination pair. We characterize prices of anarchy and stability for pure Nash and strong equilibria in PFGs and MMFGs when players have different or the same source-destination pairs. In addition, we show that when a designer can adjust allocation rates, it is possible to design games with optimal strong equilibria. Some initial results on polynomial-time algorithms in this direction are also derived.

【Keywords】: bandwidth allocation; computational complexity; game theory; minimax techniques; polynomials; telecommunication network routing; MMFG; NP-hard computation; Nash equilibria; PFG; capacity constraint; fair bandwidth allocation; game-theoretic context; max-min-fair game; optimal strong equilibria; polynomial- time algorithm; progressive filling game; routing game; source-destination pair; stability; time-depending velocity; Bandwidth; Games; Polynomials; Protocols; Resource management; Routing; Silicon; complexity and convergence; congestion control; existence of strong and Nash equilibrium; price of anarchy; routing

LO2: Localization 2 4

41. Electronic frog eye: Counting crowd using WiFi.

Paper Link】 【Pages】:361-369

【Authors】: Wei Xi ; Jizhong Zhao ; Xiang-Yang Li ; Kun Zhao ; Shaojie Tang ; Xue Liu ; Zhiping Jiang

【Abstract】: Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research and analysis. A crowd counting solution should be scalable and be minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well in a dim or dark environment. Non-image based solutions usually require every human being carrying device, and are inaccurate and unreliable in practice. In this paper, we present FCC, a device-Free Crowd Counting approach based on Channel State Information (CSI). Our design is motivated by our observation that CSI is highly sensitive to environment variation, like a frog eye. We theoretically discuss the relationship between the number of moving people and the variation of wireless channel state. A major challenge in our design of FCC is to find a stable monotonic function to characterize the relationship between the crowd number and various features of CSI. To this end, we propose a metric, the Percentage of nonzero Elements (PEM), in the dilated CSI Matrix. The monotonic relationship can be explicitly formulated by the Grey Verhulst Model, which is used for crowd counting without a labor-intensive site survey. We implement FCC using off-the-shelf IEEE 802.11n devices and evaluate its performance via extensive experiments in typical real-world scenarios. Our results demonstrate that FCC outperforms the state-of-art approaches with much better accuracy, scalability and reliability.

【Keywords】: image processing; matrix algebra; wireless LAN; wireless channels; Grey Verhulst model; IEEE 802.11n devices; PEM; Wi-Fi; channel state information; crowd counting; dilated CSI matrix; electronic frog eye; image-based solutions; percentage of nonzero elements; wireless channel state; Cameras; Computer science; Computers; Conferences; Educational institutions; FCC; Performance evaluation

42. Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.

Paper Link】 【Pages】:370-378

【Authors】: Wenchao Huang ; Yan Xiong ; Xiang-Yang Li ; Hao Lin ; XuFei Mao ; Panlong Yang ; Yunhao Liu

【Abstract】: We propose an accurate acoustic direction finding scheme, Swadloon, according to the arbitrary pattern of phone shaking in rough horizontal plane. Swadloon tracks the displacement of smartphone relative to the acoustic direction with the resolution less than 1 millimeter. The direction is then obtained by combining the velocity from the displacement with the one from the inertial sensors. Major challenges in implementing Swadloon are to measure the displacement precisely and to estimate the shaking velocity accurately when the speed of phone-shaking is low and changes arbitrarily. We propose rigorous methods to address these challenges, and apply Swadloon to several case studies: Phone-to-Phone direction finding, indoor localization and tracking. Our extensive experiments show that the mean error of direction finding is around 2.1° within the range of 32 m. For indoor localization, the 90-percentile errors are under 0.92 m. For real-time tracking, the errors are within 0.4 m for walks of 51 m.

【Keywords】: acoustic signal processing; indoor radio; radio direction-finding; radio tracking; sensors; smart phones; Swadloon; acoustic direction finding scheme; fine-grained indoor localization; indoor tracking; inertial sensors; phone shaking arbitrary pattern; phone-shaking speed; phone-to-phone direction finding; real-time tracking; rough horizontal plane; shaking velocity estimation; smartphone displacement; Acoustic measurements; Acoustics; Band-pass filters; Doppler effect; Phase locked loops; Real-time systems; Sensors

43. Anchor-free backscatter positioning for RFID tags with high accuracy.

Paper Link】 【Pages】:379-387

【Authors】: Tianci Liu ; Lei Yang ; Qiongzheng Lin ; Yi Guo ; Yunhao Liu

【Abstract】: RFID technology has been widely adopted in a variety of applications from logistics to access control. Many applications gain benefits from knowing the exact position of an RFID-tagged object. Existing localization algorithms in wireless network, however, can hardly be directly employed due to tag's limited capabilities in terms of energy and memory. For example, the RSS based methods are vulnerable to both distance and tag orientation, while AOA based methods put a strict constraint on the antennas' spacing that reader's directional antennas are too large to meet. In this paper, we propose BackPos, a fine-grained backscatter positioning technique using the COTS RFID products with detected phase. Our study shows that the phase is indeed a stable indicator highly related to tag's position and preserved over frequency or tag orientation, but challenged by its periodicity and tag's diversity. We attempt to infer the distance differences from phases detected by antennas under triangle constraint. Further, hyperbolic positioning using the distance differences is employed to shrink the tag's candidate positions until filtering out the real one. In combination with interrogation zone, we finally relax the triangle constraint and allow arbitrary deployment of antennas by sacrificing the feasible region. We implement a prototype of BackPos with COTS RFID products and evaluate this design in various scenarios. The results show that BackPos achieves the mean accuracy of 12.8cm with variance of 3.8cm.

【Keywords】: backscatter; hyperbolic equations; radio networks; radiofrequency identification; AOA based method; BackPos; COTS RFID product; RFID tag; RSS based method; anchor-free backscatter positioning; antenna arbitrary deployment; candidate position; commercial off-the-shelf radiofrequency identification; detected phase; directional antenna; distance orientation; fine-grained backscatter positioning technique; hyperbolic positioning; interrogation zone; localization algorithm; received signal strength based method; tag orientation; triangle constraint; wireless network; Antennas; Backscatter; Computers; Conferences; Equations; Radiofrequency identification; Uncertainty; BackPos; RFID; feasible region; hyperbolic positioning

44. TOC: Localizing wireless rechargeable sensors with time of charge.

Paper Link】 【Pages】:388-396

【Authors】: Yuanchao Shu ; Peng Cheng ; Yu Gu ; Jiming Chen ; Tian He

【Abstract】: Wireless rechargeable sensor network is a promising platform for long-term applications such as inventory management, supply chain monitoring and so on. For these applications, sensor localization is one of the most fundamental challenges. Different from traditional sensor node, wireless rechargeable sensor has to be charged above a voltage level by the wireless charger in order to support its sensing, computation and communication operations. In this work, we consider the scenario where a mobile charger stops at different positions to charge sensors, and propose a novel localization design that utilizes the unique Time of Charge (TOC) sequences among wireless rechargeable sensors. Specifically, we introduce two efficient region dividing methods, Inter-node Division and Inter-area Division, to exploit TOC differences from both temporal and spatial dimensions to localize individual sensor nodes. To further optimize the system performance, we introduce both an optimal charger stop planning algorithm for single sensor case and a suboptimal charger stop planning algorithm for the generic multisensor scenario with a provable performance bound. We have extensively evaluated our design by both testbed experiments and large-scale simulations. The experiment and simulation results show that by as less as 5 stops, our design can achieve sub-meter accuracy and the performance is robust under various system conditions.

【Keywords】: battery chargers; optimisation; sensor fusion; sensor placement; telecommunication network planning; wireless sensor networks; TOC; interarea division; internode division; mobile charger; multisensor; region dividing method; spatial dimension; suboptimal charger stop planning algorithm; system performance optimization; temporal dimension; time of charge; wireless charger; wireless rechargeable sensor localization; wireless rechargeable sensor network; Algorithm design and analysis; Approximation algorithms; Conferences; Peer-to-peer computing; Sensors; Wireless communication; Wireless sensor networks

MN2: Multimedia networking 2 4

45. On the geographic patterns of a large-scale mobile video-on-demand system.

Paper Link】 【Pages】:397-405

【Authors】: Zhenyu Li ; Gaogang Xie ; Jiali Lin ; Yun Jin ; Mohamed Ali Kâafar ; Kavé Salamatian

【Abstract】: The widespread availability of smart mobile terminals along with the ever increasing bandwidth capabilities has promoted the popularity of mobile Internet video systems. Understanding the geographic features of mobile content consumption is of an extreme importance for the design and the performance optimization of a mobile video delivery system. This paper is a first step towards characterization of the geographic patterns of a large-scale commercial mobile video-on-demand (VoD) system, by measuring both uniformity and intensity of geographic interests on videos. In particular, we identify a geographical concentration effect of views for individual videos, which is however dependent on video popularity. We also analyze the temporal evolution trends of the geographic popularity which reveal distinct behavior of popular and non-popular videos. While the set of locations that contribute to most of the views of non-popular videos largely varies, the daily geographic popularity distribution of popular videos closely follows the distribution of global traffic and remains stable. We also examine the impact of content type and viewing sources on the geographic features of mobile videos consumption, and the correlation between content similarity and geographic locality. Finally, we provide insights into the implications of our findings.

【Keywords】: mobile radio; video on demand; geographic pattern; large scale mobile video-on-demand system; mobile content consumption; mobile video delivery system; performance optimization; smart mobile terminal; video popularity; Computers; Conferences; Entropy; Geology; Mobile communication; Portals; TV

46. Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics.

Paper Link】 【Pages】:406-414

【Authors】: Vinay Joseph ; Sem C. Borst ; Martin I. Reiman

【Abstract】: We consider the problem of optimal rate allocation and admission control for adaptive video streaming sessions in wireless networks with user dynamics. The central aim is to achieve an optimal tradeoff between several key objectives: maximizing the average rate utility per user, minimizing the temporal rate variability, and maximizing the number of users supported. We identify the structure of algorithms that achieve asymptotically optimal performance in large-capacity systems, and exploit the insight into this structure to devise parsimonious and robust online algorithms. Extensive simulation experiments demonstrate that the proposed online algorithms perform well, even in systems with relatively small capacity.

【Keywords】: radio networks; resource allocation; telecommunication congestion control; video streaming; adaptive wireless video streaming; admission control; optimal rate allocation; temporal rate variability; user dynamics; wireless networks; Aggregates; Algorithm design and analysis; Bandwidth; Dynamic scheduling; Streaming media; Upper bound; Wireless communication

47. SoCast: Social ties based cooperative video multicast.

Paper Link】 【Pages】:415-423

【Authors】: Yang Cao ; Xu Chen ; Tao Jiang ; Junshan Zhang

【Abstract】: In this paper, we propose SoCast - a cooperative video multicast framework to stimulate effective cooperation among mobile users (clients), by leveraging two types of important social ties, i.e., social trust and social reciprocity. By using SoCast, clients can form groups to restore incomplete video frames by obtaining missing packets from other clients, according to the unique video encoding structure. In return, the user perception video quality of mobile video multicast can be improved. Specifically, we first cast the problem of social ties based group formation among clients as a coalitional game, and then devise a distributed algorithm to obtain the core solution (group formation) for the formulated coalitional game. Further, a resource allocation mechanism is proposed for the base station to handle radio resource requests from client groups. Extensive numerical studies with real video traces corroborate the significant performance gain by using the SoCast.

【Keywords】: game theory; mobile computing; video signal processing; SoCast; base station; coalitional game; cooperative video multicast; distributed algorithm; group formation; missing packets; mobile users; radio resource; resource allocation mechanism; social reciprocity; social ties; social trust; video encoding structure; video frames; video multicast framework; video quality; Encoding; Engines; Games; Mobile communication; Resource management; Streaming media; Video recording

48. Reliable video multicast over Wi-Fi networks with coordinated multiple APs.

Paper Link】 【Pages】:424-432

【Authors】: Munhwan Choi ; Weiping Sun ; Jonghoe Koo ; Sunghyun Choi ; Kang G. Shin

【Abstract】: Forward Error Correction (FEC) can be exploited to realize reliable video multicast over Wi-Fi with high video quality. We propose reliable video multicast over Wi-Fi networks with coordinated multiple Access Points (APs) to enhance video quality. By coordinating multiple APs, each AP can transmit entirely or partially different FEC-encoded packets so that a multicast receiver can benefit from both spatial and time diversities. The proposed schemes can enlarge the satisfactory video multicast region by exploiting the AP diversity, thus serving more multicast receivers located at cell edge with satisfactory video quality. We propose a resource-allocation algorithm for FEC-code rate adaptation, utilizing the limited wireless resource more efficiently while enhancing video quality. We also introduce the method for estimating the video packet delivery ratio after FEC decoding. The effectiveness of the proposed schemes is comparatively evaluated via extensive simulation and experimentation. The proposed schemes are observed to enhance the ratio of satisfied users by up to 37.1% compared to the conventional single AP multicast scheme.

【Keywords】: cellular radio; decoding; diversity reception; forward error correction; image enhancement; multimedia communication; video coding; video communication; wireless LAN; AP diversity; FEC decoding; FEC-code rate adaptation; FEC-encoded packets; Wi-Fi networks; cell edge; coordinated multiple-AP; coordinated multiple-access points; forward error correction; limited wireless resource; multicast receiver; multicast receivers; resource-allocation algorithm; spatial diversity; time diversity; video multicast reliability; video packet delivery ratio; video quality enhancement; Decoding; Forward error correction; IEEE 802.11 Standards; Reliability; Streaming media; Video recording; Wireless communication

NE2: Network economics and pricing 2 4

49. Dynamic resource provisioning in cloud computing: A randomized auction approach.

Paper Link】 【Pages】:433-441

【Authors】: Linquan Zhang ; Zongpeng Li ; Chuan Wu

【Abstract】: This work studies resource allocation in a cloud market through the auction of Virtual Machine (VM) instances. It generalizes the existing literature by introducing combinatorial auctions of heterogeneous VMs, and models dynamic VM provisioning. Social welfare maximization under dynamic resource provisioning is proven NP-hard, and modeled with a linear integer program. An efficient α-approximation algorithm is designed, with α ~ 2.72 in typical scenarios. We then employ this algorithm as a building block for designing a randomized combinatorial auction that is computationally efficient, truthful in expectation, and guarantees the same social welfare approximation factor α. A key technique in the design is to utilize a pair of tailored primal and dual LPs for exploiting the underlying packing structure of the social welfare maximization problem, to decompose its fractional solution into a convex combination of integral solutions. Empirical studies driven by Google Cluster traces verify the efficacy of the randomized auction.

【Keywords】: approximation theory; cloud computing; convex programming; electronic commerce; integer programming; linear programming; public administration; randomised algorithms; resource allocation; virtual machines; α-approximation algorithm; Google Cluster traces; NP-hard problem; cloud computing; cloud market; convex combination; dynamic VM provisioning model; dynamic resource provisioning; fractional solution decomposition; heterogeneous VM; integral solutions; linear integer program; packing structure; randomized combinatorial auction approach; resource allocation; social welfare approximation; social welfare maximization problem; virtual machine; Algorithm design and analysis; Approximation algorithms; Approximation methods; Bismuth; Heuristic algorithms; IP networks; Resource management

50. Exploring bundling sale strategy in online service markets with network effects.

Paper Link】 【Pages】:442-450

【Authors】: Weijie Wu ; Richard T. B. Ma ; John C. S. Lui

【Abstract】: In recent years, we have witnessed a growing trend for online service companies to offer “bundling sales” to increase revenue. Bundling sale means that a company groups a set of its products/services and charges this bundle at a fixed price, which is usually less than the total price of individual items. In this paper, our goal is to understand the underlying dynamics of bundling, in particular, what is the optimal bundling sale strategy and under what situations it will be more attractive than the separate sales. We focus on online service markets that exhibit network effect. We provide mathematical models to capture the interactions between buyers and sellers, analyze the market equilibrium and its stability, and formulate an optimization framework to determine the optimal sale strategy for the service provider. We analyze the impact of the key factors, including the network effects and operating costs, on the profitability of bundling. We show that bundling is more profitable than separate sale in most cases; however, the heterogeneity of services and the asymmetry of operating costs reduce the advantage of bundling. These findings provide important insights in designing proper sale strategies for online services.

【Keywords】: information services; optimisation; sales management; buyers; mathematical models; network effects; online service companies; online service markets; operating cost asymmetry; optimal bundling sale strategy; optimization framework; sale strategies; sellers; Companies; Conferences; Cost accounting; Mathematical model; Optimization; Pricing; Silicon

51. Enabling crowd-sourced mobile Internet access.

Paper Link】 【Pages】:451-459

【Authors】: George Iosifidis ; Lin Gao ; Jianwei Huang ; Leandros Tassiulas

【Abstract】: Crowd-sourced mobile Internet access services enable mobile users to connect with each other and share their Internet connections. This is a promising solution for addressing users' increasing needs for ubiquitous connectivity and alleviating network congestion. The success of such services heavily depends on users' willingness to contribute their resources. In this paper, we consider a general model for such services, and design a distributed incentive mechanism for encouraging users' participation. This bargaining based scheme ensures that the contribution of user resources, in terms of Internet access bandwidths and battery energy, and the allocation of service capacity, measured in the delivered mobile data, are Pareto efficient and proportionally fair. The numerical results verify that the service always improves users' performance and that these benefits depend on the diversity of the users' resources.

【Keywords】: Internet; Pareto optimisation; mobile communication; mobile computing; Internet connections; Pareto efficient; battery energy; crowd sourced mobile Internet access; distributed incentive mechanism; mobile users; network congestion; ubiquitous connectivity; IEEE 802.11 Standards; Internet; Logic gates; Mobile communication; NIST; Online banking; Routing

52. Trade-offs in optimizing the cache deployments of CDNs.

Paper Link】 【Pages】:460-468

【Authors】: Syed Hasan ; Sergey Gorinsky ; Constantine Dovrolis ; Ramesh K. Sitaraman

【Abstract】: Content delivery networks (CDNs) deploy globally distributed systems of caches in a large number of autonomous systems (ASes). It is important for a CDN operator to satisfy the performance requirements of end users, while minimizing the cache deployment cost. In this paper, we study the cache deployment optimization (CaDeOp) problem of determining how much server, energy, and bandwidth resources to provision in each cache AS, i.e., each AS chosen for cache deployment. The CaDeOp objective is to minimize the total cost incurred by the CDN, subject to meeting the end-user performance requirements. We formulate the CaDeOp problem as a mixed integer program (MIP) and solve it for realistic AS-level topologies, traffic demands, and non-linear energy and bandwidth costs. We also evaluate the sensitivity of the results to our parametric assumptions. When the end-user performance requirements become more stringent, the CDN footprint rapidly expands, requiring cache deployments in additional ASes and geographical regions. Also, the CDN cost increases several times, with the cost balance shifting toward bandwidth and energy costs. On the other hand, the traffic distribution among the cache ASes stays relatively even, with the top 20% of the cache ASes serving around 30% of the overall traffic.

【Keywords】: Internet; cache storage; cost reduction; integer programming; telecommunication network topology; telecommunication traffic; AS-level topologies; CDN; CaDeOp problem; Internet data dissemination; MIP; autonomous systems; bandwidth cost; cache deployment cost minimization; cache deployment optimization; content delivery networks; distributed systems; end-user performance requirements; mixed integer program; nonlinear energy; traffic demands; traffic distribution; Approximation methods; Bandwidth; Internet; Pricing; Servers; Topology; Vectors

RF2: RFID 2 4

53. Twins: Device-free object tracking using passive tags.

Paper Link】 【Pages】:469-476

【Authors】: Jinsong Han ; Chen Qian ; Xing Wang ; Dan Ma ; Jizhong Zhao ; Pengfeng Zhang ; Wei Xi ; Zhiping Jiang

【Abstract】: Device-free based object tracking provides a promising solution for many localization and tracking systems to monitor non-cooperative objects which do not carry any transceiver such as intruders. However, existing device-free solutions mainly use sensors and active RFID tags, which are much more expensive compared to passive tags. In this paper, we propose a novel motion detection and tracking method using passive RFID tags, named Twins. The method leverages a phenomenon called critical state caused by interference among passive tags. We theoretically explain this phenomenon via an interference model and conduct extensive experiment to validate it. We design a practical Twins based intrusion detection system and implement a real prototype with commercial off-the-shelf reader and tags. Experimental results show that Twins is effective in detecting the moving object, with low location errors of 0.75m in average.

【Keywords】: motion estimation; object detection; object tracking; radiofrequency identification; radiofrequency interference; safety systems; Twins based intrusion detection system; active RFID tags; commercial off-the-shelf reader; critical state; device-free based object tracking; device-free solutions; interference model; location errors; motion detection method; noncooperative objects; passive RFID tags; tracking method; tracking systems; Antennas; Couplings; Motion detection; Particle filters; Prototypes; Radiofrequency identification; Tracking; Critical State; Device-free; Passive RFID tag; Tracking

54. Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation.

Paper Link】 【Pages】:477-485

【Authors】: Wei Gong ; Kebin Liu ; Xin Miao ; Haoxiang Liu

【Abstract】: One important issue of RFID applications is to estimate the cardinality of large-scale RFID tags in the interested region. From a practical perspective, we require: (i) the estimate can be arbitrarily accurate, and (ii) its time cost should be scalable with the tags size, regardless of the tags distribution. Existing solutions, however, either assume the use of hash functions with ideal random properties, or impose unacceptable computation/storage overhead for tags. More importantly, those approaches only give asymptotic results and fail to provide rigorous bounds for the rate of convergence. In this paper, we propose a new scheme, Arbitrarily Accurate Approximation (A3), to reliably estimate the number of tags with any desired accuracy. In particular, for a given requirement of (ε,δ), we show that A3 achieves O((log log n+ε-2) log δ-1) time efficiency. Results show that A3 significantly outperforms previous designs under various distributions of tags.

【Keywords】: approximation theory; computational complexity; radiofrequency identification; arbitrarily accurate approximation scheme; convergence rate; hash functions; large-scale RFID cardinality estimation; large-scale RFID tags; random property; tag distribution; tag size; time cost; Accuracy; Approximation algorithms; Approximation methods; Error probability; Estimation; RFID tags

55. Towards adaptive continuous scanning in large-scale RFID systems.

Paper Link】 【Pages】:486-494

【Authors】: Haoxiang Liu ; Wei Gong ; Xin Miao ; Kebin Liu ; Wenbo He

【Abstract】: Radio Frequency Identification (RFID) technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory (tags). In such continuous scanning scenario, adjacent scans inevitably read overlapping tags multiple times. Most existing methods suffer from low scanning efficiency when the overlap is small, since they do not distinguish the size of overlap which is an important factor of scanning performance. In this paper, we analytically unveil the fundamental relationship between the performance of continuous scanning and the size of overlap, deriving a critical threshold for the selection of scanning strategy. Further, we design an accurate estimator to approximate the overlap. Combining the estimate and a compact data structure, an adaptive scanning scheme is introduced to achieve low communication time. Through detailed analysis and extensive simulations, we demonstrate that the proposed scheme significantly outperforms previous approach in total scanning time.

【Keywords】: data structures; radiofrequency identification; adaptive continuous scanning; adaptive scanning scheme; compact data structure; inventory control; large-scale RFID systems; low communication time; radiofrequency identification technology; supply chain logistics; Algorithm design and analysis; Computers; Conferences; Estimation; Protocols; Radiofrequency identification; Servers

56. Read bulk data from computational RFIDs.

Paper Link】 【Pages】:495-503

【Authors】: Yuanqing Zheng ; Mo Li

【Abstract】: Without the need of local energy supply, computational RFID (CRFID) sensors are emerging as important platforms enabling a variety of sensing and computing applications. Nevertheless, the data throughput of CRFIDs is very low. This paper aims at efficiently transferring bulk data from CRFIDs to commodity RFID readers. We first investigate the problem of low data throughput of CRFIDs. We then propose several simple yet effective techniques to allow CRFIDs to meet stringent timing requirement of commodity RFID readers and achieve efficient data transfer. We implement a prototype system based on the WISP CRFIDs and commercial off-the-self RFID reader. The experiment results show that our approach provides better compatibility with EPCglobal C1G2 compliant RFID devices and works perfectly with the commodity RFID readers.

【Keywords】: radiofrequency identification; sensors; CRFID data throughput; CRFID sensors; EPCglobal C1G2 compliant RFID devices; WISP CRFID; commercial off-the-self RFID reader; commodity RFID readers; computational RFID sensors; data transfer efficiency; read bulk data; Computers; Data transfer; Microcontrollers; Radiofrequency identification; Standards; Timing

SP2: Security and privacy 2 4

57. Achieving differential privacy of data disclosure in the smart grid.

Paper Link】 【Pages】:504-512

【Authors】: Jing Zhao ; Taeho Jung ; Yu Wang ; Xiangyang Li

【Abstract】: The smart grid introduces new privacy implications to individuals and their family due to the fine-grained usage data collection. For example, smart metering data could reveal highly accurate real-time home appliance energy load, which may be used to infer the human activities inside the houses. One effective way to hide actual appliance loads from the outsiders is Battery-based Load Hiding (BLH), in which a battery is installed for each household and smartly controlled to store and supply power to the appliances. Even though such technique has been demonstrated useful and can prevent certain types of attacks, none of existing BLH works can provide probably privacy-preserving mechanisms. In this paper, we investigate the privacy of smart meters via differential privacy. We first analyze the current existing BLH methods and show that they cannot guarantee differential privacy in the BLH problem. We then propose a novel randomized BLH algorithm which successfully assures differential privacy, and further propose the Multitasking-BLH-Exp3 algorithm which adaptively updates the BLH algorithm based on the context and the constraints. Results from extensive simulations show the efficiency and effectiveness of the proposed method over existing BLH methods.

【Keywords】: data acquisition; domestic appliances; smart meters; smart power grids; BLH methods; battery-based load hiding; data disclosure; fine-grained usage data collection; multitasking-BLH-Exp3 algorithm; privacy-preserving mechanisms; real-time home appliance energy load; smart grid; smart metering data; smart meters via differential privacy; Batteries; Data privacy; Energy consumption; Home appliances; Noise; Privacy; Smart meters; Data Disclosure; Differential Privacy; Privacy; Smart Grid; Smart Meter

58. Optimal privacy-preserving energy management for smart meters.

Paper Link】 【Pages】:513-521

【Authors】: Lei Yang ; Xu Chen ; Junshan Zhang ; H. Vincent Poor

【Abstract】: Smart meters, designed for information collection and system monitoring in smart grid, report fine-grained power consumption to utility providers. With these highly accurate profiles of energy usage, however, it is possible to identify consumers' specific activity or behavior patterns, thereby giving rise to serious privacy concerns. In this paper, this concern is addressed by using battery energy storage. Beyond privacy protection, batteries can also be used to cut down the electricity bill. From a holistic perspective, a dynamic optimization framework is designed for consumers to strike a tradeoff between the smart meter data privacy and the electricity bill. In general, a major challenge in solving dynamic optimization problems lies in the need of the knowledge of the future electricity consumption events. By exploring the underlying structure of the original problem, an equivalent problem is derived, which can be solved by using only the current observations. An online control algorithm is then developed to solve the equivalent problem based on the Lyapunov optimization technique. To overcome the difficulty of solving a mixed-integer nonlinear program involved in the online control algorithm, the problem is further decomposed into multiple cases and the closed-form solution to each case is derived accordingly. It is shown that the proposed online control algorithm can optimally control the battery operations to protect the smart meter data privacy and cut down the electricity bill, without the knowledge of the statistics of the time-varying load requirement and the electricity price processes. The efficacy of the proposed algorithm is demonstrated through extensive numerical evaluations using real data.

【Keywords】: data privacy; integer programming; nonlinear programming; power consumption; smart meters; smart power grids; Lyapunov optimization technique; battery energy storage; dynamic optimization framework; dynamic optimization problems; electricity bill; electricity consumption; information collection; mixed-integer nonlinear program; online control algorithm; optimal privacy-preserving energy management; power consumption; privacy protection; smart grid; smart meter data privacy; time-varying load requirement; Algorithm design and analysis; Batteries; Data privacy; Electricity; Optimization; Privacy; Smart meters; Battery; Cost Saving; Data Privacy; Load Monitor; Smart Grid; Smart Meter

Paper Link】 【Pages】:522-530

【Authors】: Qingji Zheng ; Shouhuai Xu ; Giuseppe Ateniese

【Abstract】: It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, the outsourced data should be encrypted. This however brings a range of problems, such as: How should a data owner grant search capabilities to the data users? How can the authorized data users search over a data owner's outsourced encrypted data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The solution allows a data user, whose credentials satisfy a data owner's access control policy, to (i) search over the data owner's outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has faithfully executed the search operations. We formally define the security requirements of VA B K S and describe a construction that satisfies them. Performance evaluation shows that the proposed schemes are practical and deployable.

【Keywords】: authorisation; cloud computing; cryptography; information retrieval; outsourcing; trusted computing; VABKS; authorized data users; cloud; cryptographic solution; data owner access control policy; data owners; outsourced encrypted data; performance evaluation; search capabilities; search operations; verifiable attribute-based keyword search; Access control; Encryption; Indexes; Keyword search; TV

60. Deep packet inspection with DFA-trees and parametrized language overapproximation.

Paper Link】 【Pages】:531-539

【Authors】: Daniel Luchaup ; Lorenzo De Carli ; Somesh Jha ; Eric Bach

【Abstract】: IPSs determine whether incoming traffic matches a database of vulnerability signatures defined as regular expressions. DFA representations are popular, but suffer from the state-explosion problem. We introduce a new matching structure: a tree of DFAs where the DFA associated with a node over-approximates those at its children, and the DFAs at the leaves represent the signature set. Matching works top-down, starting at the root of the tree and stopping at the first node whose DFA does not match. In the common case (benign traffic) matching does not reach the leaves. DFA-trees are built using Compact Overapproximate DFAs (CODFAs). A CODFA D' for D over-approximates the language accepted by D, has a smaller number of states than D, and has a low false-match rate. Although built from approximate DFAs, DFA-trees perform exact matching faster than a commonly used method, have a low memory overhead and a guaranteed good worst case performance.

【Keywords】: computational complexity; deterministic automata; digital signatures; finite automata; formal languages; pattern matching; tree data structures; CODFAs; DFA-trees; IPSs; NP-hard problem; benign traffic matching; compact overapproximate DFAs; deep packet inspection; deterministic finite automata; intrusion prevention system; low false-match rate; low memory overhead; matching structure; parametrized language overapproximation; regular expressions; state-explosion problem; vulnerability signatures; Approximation error; Automata; Computers; Conferences; DH-HEMTs; Payloads; Training

WN2: Wireless networks 2 4

61. Hello: A generic flexible protocol for neighbor discovery.

Paper Link】 【Pages】:540-548

【Authors】: Wei Sun ; Zheng Yang ; Keyu Wang ; Yunhao Liu

【Abstract】: Neighbor discovery is crucial for both wireless sensor networks and mobile computing applications. The crux of the problem is to achieve energy efficiency, which has been demonstrated to be difficult by prior work. In this paper we propose Hello, a generic flexible protocol for neighbor discovery. With an unrestricted parameter, it serves as a generic framework that incorporates existing deterministic protocols. Under the framework, we expose optimal parameters for either symmetric or asymmetric duty cycles, which is the first to our knowledge. As a result, it exhibits great flexibility by adjusting itself to any configuration that best meets application demands. Besides, several techniques are applied to removing redundant discoveries without sacrificing the worst-case latency. We evaluate Hello through extensive simulation and real-world sensor experiments. The results show that Hello is highly energy-efficient under symmetric and asymmetric duty cycles. In particular, it is two times better than the state of the art in terms of the worst-case latency under asymmetric duty cycles.

【Keywords】: mobile computing; protocols; wireless sensor networks; Hello; asymmetric duty cycles; deterministic protocols; energy efficiency; generic flexible protocol; mobile computing applications; neighbor discovery; redundant discovery removal; symmetric duty cycles; wireless sensor networks; Computers; Conferences; Mobile computing; Probabilistic logic; Protocols; Schedules; Wireless sensor networks

62. Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying.

Paper Link】 【Pages】:549-557

【Authors】: Liyang Zhang ; Zhangyu Guan ; Tommaso Melodia

【Abstract】: Denial-of-service (DoS) attacks launched by malicious jammers can pose significant threats to infrastructure-less wireless networks where a centralized controller may not be available. While significant recent research efforts have dealt with such attacks and several possible countermeasures have been proposed, little attention has been paid to the idea of cooperative anti-jamming. Inspired by this observation, we propose and study a cooperative anti-jamming scheme designed to enhance the quality of links degraded by jammers. To achieve this objective, users are allowed to cooperate at two levels. First, they cooperate to optimally regulate their channel access probabilities so that jammed users gain a higher share of channel utilization. Second, users leverage multiple-input single-output cooperative communication techniques to enhance the throughput of jammed links. We formulate the problem of optimal cooperative anti-jamming as a distributed pricing-based optimization problem and propose a best response algorithm to solve it in a distributed way. Simulations demonstrate that the proposed algorithm achieves considerable gains (compared to traditional noncooperative antijamming) especially under heavy traffic or high jamming power. Furthermore, by comparing the proposed algorithm with a provably-optimal centralized algorithm, we show that it achieves close-to-global optimality under moderate traffic load.

【Keywords】: MIMO communication; cooperative communication; interference suppression; jamming; pricing; probability; radio networks; relay networks (telecommunication); stochastic processes; telecommunication industry; telecommunication network reliability; telecommunication traffic; wireless channels; DoS attack; channel access probability; channel utilization; cooperative antijamming scheme; denial-of-service attack; distributed pricing-based optimization problem; infrastructureless wireless network; malicious jammer; optimal cooperative anti-jamming problem; provably-optimal centralized algorithm; stochastic relaying; traffic load moderation; users leverage multiple-input single-output cooperative communication technique; Algorithm design and analysis; Jamming; OFDM; Physical layer; Relays; Resource management; Sensors

63. Restricted coverage in wireless networks.

Paper Link】 【Pages】:558-564

【Authors】: XiaoHua Xu ; Min Song

【Abstract】: For wireless networks, coverage with different restrictions that can capture the practical requirements have received great research interests. We will study several restricted coverage problems. The first problem is about K-coverage, i.e., how to deploy wireless nodes such that each target is covered by at least K wireless nodes. We study the problem restricted to linear-K-coverage where there is a line, all targets lie in one side of this line and all wireless nodes lie in the other side. Assume each wireless node is associated with a weight, the objective is to select a minimum weighted subset of nodes such that each target is K-covered. We propose a 3-approximation for this problem by exploring geometric properties. The second problem is called K-road-coverage. Given a road map in a two-dimensional area which contains a set of paths and a set of wireless nodes, the locations of nodes can either be arbitrary or fixed, the objective is to select a minimum number of wireless nodes such that each path can be K-covered. We will reduce the problem to K-coverage and apply the algorithmic results for K-coverage to solve it. Another line of this work is to investigate a well-motivated problem called strongly dominating set, which is intrinsically related to coverage. Given a wireless networking system represented by a digraph G = (V, E⃗). Each wireless node u has a covering disk centering at u with its radius equal to the transmission range of u. We then draw a directed edge uv⃗ in G if u's corresponding covering disk contains v. A subset U ⊆ V of wireless nodes is a strongly dominating set if every wireless node in V U has both an in-neighbor in U and an out-neighbor in U. The objective is to find a minimum size strongly dominating set. Our method can achieve an approximation factor of (2 + ε).

【Keywords】: Approximation algorithms; Approximation methods; Computers; Conferences; Polynomials; Wireless communication; Wireless sensor networks

64. Optimal delay bound for maximum weight scheduling policy in wireless networks.

Paper Link】 【Pages】:565-573

【Authors】: Cem Boyaci ; Ye Xia

【Abstract】: We provide an improved bound for the expectation of the stationary delay under the maximum weight scheduling (MWS) policy in one-hop wireless networks. In the model, the interference of the links is characterized by an interference graph G=(V, E). For a vector μ ϵ R|V|+, let χf (G, μ) be the weighted fractional coloring number for the graph G under the weight vector μ. For an arrival rate vector λ in the capacity region, we define a quantity ε(λ) to be the unique value satisfying the condition χf(G, λ+ε(λ) e) = 1, where e = (1, 1,..., 1)T. We show that the stationary delay is upper-bounded by B(2(Σi=1|V|λi) ε(λ)), where B is a constant depending on the arrival process. We show that the new bound is the tightest single-parameter bound obtainable with an often-used analytical framework. Generalizing the above, we also provide the tightest bounds for all MWS-w policies.

【Keywords】: graph theory; radio links; scheduling; vectors; MWS policy; MWS-w policies; arrival rate vector; capacity region; interference graph; maximum weight scheduling policy; one-hop wireless networks; single-parameter bound; stationary delay; weight vector; weighted fractional coloring number; Computers; Conferences; Delays; Interference; Schedules; Vectors; Wireless communication; delay; maximum weight schedule; queue size; stability; wireless link scheduling

CC3: Cloud computing 3 4

65. Delay guaranteed live migration of Virtual Machines.

Paper Link】 【Pages】:574-582

【Authors】: Jiao Zhang ; Fengyuan Ren ; Chuang Lin

【Abstract】: The proliferation of cloud services makes virtualization technology more important. One important feature of virtualization is live Virtual Machine (VM) migration, which can be employed to facilitate load balancing, fault management and server maintenance etc. Two main metrics of evaluating a live VM migration mechanism are total migration time and downtime. The existing literature on live VM migration mainly focus on designing migration mechanisms to shorten these two metrics or making a tradeoff between them. Few of them can be applied to the applications with delay requirements, such as, delay-sensitive web services or a VM backup process that needs to be done in a specific time. This will not only negatively impact the user experiences, but also reduce the profit of cloud service providers. Besides, the frequently varied bandwidth required by the widely used pre-copy mechanism is difficult to be provided by current network technologies. In this work, we theoretically analyze how much bandwidth is required to guarantee the total migration time and downtime of a live VM migration. We first propose a deterministic-based model as a simple example, then assume that the dirtying frequency of each page obeys the bernoulli distribution. At last, we analyze the statistic features of the typical workload running in a VM and build a reciprocal-based workload model, and theoretically give the required bandwidth value to satisfy the performance metrics of a live VM migration. The experimental results demonstrate that the bandwidth obtained from the reciprocal-based model can guarantee the expected total migration time and downtime.

【Keywords】: Web services; cloud computing; fault diagnosis; resource allocation; software maintenance; virtual machines; virtualisation; Bernoulli distribution; VM backup process; VM migration mechanism; bandwidth value; cloud service provider; current network technology; delay guaranteed live migration; delay requirement; delay-sensitive Web services; deterministic-based model; dirtying frequency; fault management; live VM migration; live virtual machine migration; load balancing; migration mechanisms; performance metrics; precopy mechanism; reciprocal-based workload model; server maintenance; virtual machines; virtualization technology; Bandwidth; Conferences; Delays; Distribution functions; Kernel; Nickel; Servers; Bandwidth; Delay; Live Migration; Virtualization

66. Dominant resource fairness in cloud computing systems with heterogeneous servers.

Paper Link】 【Pages】:583-591

【Authors】: Wei Wang ; Baochun Li ; Ben Liang

【Abstract】: We study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. We design a multi-resource allocation mechanism, called DRFH, that generalizes the notion of Dominant Resource Fairness (DRF) from a single server to multiple heterogeneous servers. DRFH provides a number of highly desirable properties. With DRFH, no user prefers the allocation of another user; no one can improve its allocation without decreasing that of the others; and more importantly, no user has an incentive to lie about its resource demand. As a direct application, we design a simple heuristic that implements DRFH in real-world systems. Large-scale simulations driven by Google cluster traces show that DRFH significantly outperforms the traditional slot-based scheduler, leading to much higher resource utilization with substantially shorter job completion times.

【Keywords】: cloud computing; resource allocation; DRF notion; DRFH multiresource allocation mechanism; Google cluster traces; cloud computing systems; dominant resource fairness; heterogeneous servers; job completion times; memory configuration; multiresource allocation problem; processing configuration; resource configuration space; resource utilization; slot-based scheduler; storage configuration; Cloud computing; Computational modeling; Computers; Resource management; Schedules; Servers; Vectors

67. SAP: Similarity-aware partitioning for efficient cloud storage.

Paper Link】 【Pages】:592-600

【Authors】: Bharath Balasubramanian ; Tian Lan ; Mung Chiang

【Abstract】: Given a set of files that show a certain degree of similarity, we consider a novel problem of deduplicating them (eliminating redundant chunks) across a set of distributed servers in a manner that is: (i) space-efficient: the total space needed to deduplicate and store the files is minimized and, (ii) access-efficient: each file can be accessed by communicating with a bounded number of servers, thereby minimizing network-access times in congested data center networks. A space-optimal solution in which we first deduplicate all the files and then distribute them across the servers (referred to as chunk-distribution), may require communication with many servers to access each file. On the other hand, an access-efficient solution in which we randomly partition the files cross the servers, and then store their unique chunks on each server may not exploit the similarities across files to reduce the space overhead. In this paper, we first show that finding an access-efficient, space optimal solution is an NP-Hard problem. Following this, we present the similarity-aware-partitioning (SAP) algorithms that find access-efficient solutions within polynomial time complexity and guarantees bounded space overhead for arbitrary files. Our experimental verification on files from Dropbox and CNN confirm that the SAP technique is much more space-efficient than random partitioning, while maintaining compression ratio close to the chunk-distribution solution.

【Keywords】: cloud computing; computational complexity; computer centres; data communication; file servers; storage management; CNN; Dropbox; NP-hard problem; SAP technique; arbitrary files; bounded space overhead; chunk distribution; chunk storage; cloud storage; data center network congestion; deduplicating problem; distributed server; efficient optimal solution access; file access; file distribution; file storage; network access time minimization; polynomial time complexity; random partition; similarity aware partitioning; space optimal solution; Computers; Conferences; Partitioning algorithms; Polynomials; Servers; Upper bound; Writing

68. Scheduling jobs with dwindling resource requirements in clouds.

Paper Link】 【Pages】:601-609

【Authors】: Sivan Albagli-Kim ; Hadas Shachnai ; Tami Tamir

【Abstract】: We consider a job-scheduling problem arising on cloud systems and in broadcasting networks, where the goal is to optimally utilize a limited amount of a resource (e.g., cloud servers, bandwidth, or storage capacity) available along a given time interval. The resource is utilized by a set of weighted jobs. The processing of a job consists of several contiguous stages, each having a specific length and a specific resource-demand, such that the set of demands forms a decreasing sequence. Each job is associated with a release time and a deadline, defining the time interval in which it can be processed. Some notable applications for this scenario include progressive download, QuickStart and prefetching methods, hierarchical image reconstruction, and routine security and maintenance tasks. The goal is to find a feasible schedule of a maximum-weight subset of the jobs. In a feasible schedule, at any time, the total amount of resource allocated to the active jobs does not exceed the available amount of resource. Since this problem is NP-hard already for highly restricted inputs, we focus on obtaining approximation algorithms and heuristics and present a comparative study among them. Our main result, the first constant-factor approximation algorithm for the problem, generalizes the state of art for the fundamental problem of resource constrained real-time scheduling, to scenarios where jobs may have dwindling resource requirements. Our empirical study shows that this algorithm is in fact nearly optimal for realistic inputs.

【Keywords】: approximation theory; job shop scheduling; approximation algorithms; broadcasting networks; cloud systems; constant-factor approximation algorithm; dwindling resource requirements; image reconstruction; job scheduling problem; prefetching methods; routine security; weighted jobs; Approximation algorithms; Approximation methods; Color; Linear programming; Processor scheduling; Schedules; Servers

IM1: Internet monitoring and measurement 1 4

69. Spatio-temporal factorization of log data for understanding network events.

Paper Link】 【Pages】:610-618

【Authors】: Tatsuaki Kimura ; Keisuke Ishibashi ; Tatsuya Mori ; Hiroshi Sawada ; Tsuyoshi Toyono ; Ken Nishimatsu ; Akio Watanabe ; Akihiro Shimoda ; Kohei Shiomoto

【Abstract】: Understanding the impacts and patterns of network events such as link flaps or hardware errors is crucial for diagnosing network anomalies. In large production networks, analyzing the log messages that record network events has become a challenging task due to the following two reasons. First, the log messages are composed of unstructured text messages generated by vendor-specific rules. Second, network equipment such as routers, switches, and RADIUS severs generate various log messages induced by network events that span across several geographical locations, network layers, protocols, and services. In this paper, we have tackled these obstacles by building two novel techniques: statistical template extraction (STE) and log tensor factorization (LTF). STE leverages a statistical clustering technique to automatically extract primary templates from unstructured log messages. LTF aims to build a statistical model that captures spatial-temporal patterns of log messages. Such spatial-temporal patterns provide useful insights into understanding the impacts and root cause of hidden network events. This paper first formulates our problem in a mathematical way. We then validate our techniques using massive amount of network log messages collected from a large operating network. We also demonstrate several case studies that validate the usefulness of our technique.

【Keywords】: IP networks; electronic messaging; matrix decomposition; protocols; spatiotemporal phenomena; statistics; telecommunication network management; telecommunication network routing; tensors; LTF; RADIUS severs; STE; geographical locations; hardware errors; link flaps; log data; log tensor factorization; network anomalies; network equipment; network events; network layers; network log messages; production networks; protocols; spatial-temporal patterns; spatio-temporal factorization; statistical clustering technique; statistical model; statistical template extraction; unstructured text messages; vendor-specific rules; Computers; Conferences; Data mining; Hidden Markov models; Mathematical model; Protocols; Tensile stress

70. Mining checkins from location-sharing services for client-independent IP geolocation.

Paper Link】 【Pages】:619-627

【Authors】: Hao Liu ; Yaoxue Zhang ; Yuezhi Zhou ; Di Zhang ; Xiaoming Fu ; K. K. Ramakrishnan

【Abstract】: Accurately determining the geographic location of an Internet host is important for location-aware applications such as location-based advertising and network diagnostics. Despite their fast response time, widely used database-driven geolocation approaches provide only inaccurate locations. Delay measurement based approaches improve the estimation accuracy but still suffer from a limited precision (about 10 km) and a long response time (tens of seconds) to localize a single PC, which cannot meet the demand of precise and real-time geolocation for location-aware applications. In this paper, we propose a new geolocation approach, Checkin-Geo, which exploits geolocation resources fundamentally different from existing database-driven (using DNS, Whois, etc.) or network delay measurement based approaches. In particular, we leverage the location data that users are willing to share in location-sharing services and logs of user logins from PCs for real-time and accurate geolocation. Experimental results show that compared to existing geolocation techniques, Checkin-Geo achieves 1) a median estimation error of 799 meters (an order of magnitude smaller than existing approaches), and 2) a negligible response time, which are promising for accurate location-aware applications.

【Keywords】: IP networks; Internet; data mining; Checkin-Geo; Internet host; checkins mining; client-independent IP geolocation; database-driven geolocation; geographic location; location-aware applications; location-based advertising; location-sharing services; median estimation error; network delay measurement; network diagnostics; real-time geolocation; user logins; Advertising; Delays; Geology; Global Positioning System; History; IP networks; Time factors

71. Packet classification using binary Content Addressable Memory.

Paper Link】 【Pages】:628-636

【Authors】: Alex X. Liu ; Chad R. Meiners ; Eric Torng

【Abstract】: Packet classification is the core mechanism that enables many networking devices. Although using Ternary Content Addressable Memories (TCAMs) to perform high speed packet classification has become the widely adopted solution, TCAMs are very expensive, have limited capacity, consume large amounts of power, and generate tremendous amounts of heat because of their extremely dense and parallel circuitry. In this paper, we propose the first packet classification scheme that uses Binary Content Addressable Memories (BCAMs). BCAMs are similar to TCAMs except that in BCAMs, every bit has only two possible states: 0 or 1; in contrast, in TCAMs, every bit has three possible states: 0, 1, or * (don't care). Because of the high complexity in implementing the extra “don't care” state, TCAMs have much higher circuit density than BCAMs. As the power consumption, heat generation, and price grow non-linearly with circuit density, BCAMs consume much less power, generate much less heat, and cost much less money than TCAMs. Our BCAM based packet classification scheme is built on two key ideas. First, we break a multi-dimensional lookup into a series of one-dimensional lookups. Second, for each one-dimensional lookup, we convert the ternary matching problem into a binary string exact matching problem. To speed up the lookup process, we propose a number of optimization techniques including skip lists, free expansion, minimizing maximum lookup time, minimizing average lookup time, and lookup short circuiting. We evaluated our BCAM scheme on 17 real-life packet classifiers. On these classifiers, our BCAM scheme requires roughly 5 times fewer CAM bits than the traditional TCAM based scheme. The penalty is a throughput that is roughly 4 times less.

【Keywords】: circuit optimisation; content-addressable storage; pattern classification; power consumption; string matching; BCAMs; TCAMs; average lookup time minimization; binary content addressable memory; binary string exact matching problem; circuit density; don't care state; free expansion; heat generation; high speed packet classification; maximum lookup time minimization; multidimensional lookup; networking devices; optimization techniques; packet classification scheme; parallel circuitry; power consumption; price; skip lists; ternary matching problem; Associative memory; Computer aided manufacturing; Computers; Conferences; Ports (Computers); Throughput; Transistors

72. A reduction-based approach towards scaling up formal analysis of internet configurations.

Paper Link】 【Pages】:637-645

【Authors】: Anduo Wang ; Alexander J. T. Gurney ; Xianglong Han ; Jinyan Cao ; Boon Thau Loo ; Carolyn L. Talcott ; Andre Scedrov

【Abstract】: The Border Gateway Protocol (BGP) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by independently setting local policies on route filtering and selection. This independence leads to fragile networking and makes analysis of policy configurations very complex. To aid the systematic and efficient study of the policy configuration space, this paper presents network reduction, a scalability technique for policy-based routing systems. In network reduction, we provide two types of reduction rules that transform policy configurations by merging duplicate and complementary router configurations to simplify analysis. We show that the reductions are sound, dual of each other and are locally complete. The reductions are also computationally attractive, requiring only local configuration information and modification. We have developed a prototype of network reduction and demonstrated that it is applicable on various BGP systems and enables significant savings in analysis time. In addition to making possible safety analysis on large networks that would otherwise not complete within reasonable time, network reduction is also a useful tool for discovering possible redundancies in BGP systems.

【Keywords】: Internet; routing protocols; AS; BGP systems; Internet configurations; autonomous system; border gateway protocol; formal analysis; network reduction; policy based routing systems; policy configurations; reduction based approach; route filtering; route selection; safety analysis; scalability technique; single interdomain routing protocol; Computers; Conferences; Merging; Protocols; Redundancy; Routing; Safety

NC: Network coding 4

73. A matroid theory approach to multicast network coding.

Paper Link】 【Pages】:646-654

【Authors】: Xunrui Yin ; Zongpeng Li ; Xin Wang

【Abstract】: Network coding encourages the mixing of information flows at intermediate nodes of a network for enhanced network capacity, especially for one-to-many multicast applications. A fundamental problem in multicast network coding is to construct a feasible solution such that encoding and decoding are performed over a finite field of size as small as possible. Coding operations over very small finite fields (e.g., F2) enable low computational complexity in theory and ease of implementation in practice. In this work, we propose a new approach based on matroid theory to study multicast network coding and its minimum field size requirements. Applying this new approach that translates multicast networks into matroids, we derive the first upper-bounds on the field size requirement based on the number of relay nodes in the network, and make new progresses along the direction of proving that coding over very small fields (F2 and F3) suffices for multicast network coding in planar networks.

【Keywords】: combinatorial mathematics; matrix algebra; multicast communication; network coding; coding operations; decoding; encoding; enhanced network capacity; information flows; intermediate nodes; matroid theory; minimum field size requirements; multicast network coding; multicast networks; one-to-many multicast applications; planar networks; relay nodes; Encoding; Multicast communication; Network coding; Receivers; Relays; Throughput; Vectors

Paper Link】 【Pages】:655-663

【Authors】: Wei-Cheng Kuo ; Chih-Chun Wang

【Abstract】: This paper considers the downlink traffic from a base station to two different clients. Assuming infinite backlog, it is known that inter-session network coding (INC) can significantly increase the throughput of each flow. However, the corresponding scheduling solution (assuming dynamic arrivals and requiring bounded delay) is still nascent. For the 2-flow downlink scenario, we propose the first opportunistic INC + scheduling solution that is provably optimal for time-varying channels, i.e., the corresponding stability region matches the optimal linear-INC capacity. To that end, we first introduce a new binary INC operation, which is distinctly different from the traditional wisdom of XORing two overheard packets. We then develop a queue-length-based scheduling scheme, which, with the help of the new INC operation, can robustly and optimally adapt to time-varying channel quality. A byproduct of our results is a scheduling scheme for stochastic processing networks (SPNs) with random departure. The new SPN results relax the previous assumption of deterministic departure, a major limitation of the existing SPN model, by considering stochastic packet departure behavior, and could further broaden the applications of SPN scheduling to other real-world scenarios.

【Keywords】: network coding; scheduling; telecommunication traffic; INC; SPN scheduling application; bounded delay; downlink 2-flow intersession network coding; downlink traffic; dynamic arrivals; infinite backlog; optimal opportunistic scheduling; queue length based scheduling scheme; robust opportunistic scheduling; stability region; stochastic processing networks; time-varying channel quality; time-varying channels; Computers; Downlink; Dynamic scheduling; Throughput; Time-varying channels; Vectors

75. DAWN: Defending against wormhole attacks in wireless network coding systems.

Paper Link】 【Pages】:664-672

【Authors】: Shiyu Ji ; Tingting Chen ; Sheng Zhong ; Subhash Kak

【Abstract】: Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes' devastating harmful impact on network coding system performance through experiments. Then we propose DAWN, a Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks. We find that the robustness depends on the node density in the network, and prove a necessary condition to achieve collusion-resistance. DAWN does not rely on any location information, global synchronization assumptions or special hardware/middleware. It is only based on the local information that can be obtained from regular network coding protocols, and thus does not introduce any overhead by extra test messages. Extensive experimental results have verified the effectiveness and the efficiency of DAWN.

【Keywords】: network coding; radio networks; synchronisation; telecommunication security; DAWN; collusion attacks; collusion-resistance; detection rate; distributed detection algorithm; flow directions; global synchronization assumptions; location information; node density; pollution attacks; regular network coding protocols; test messages; wireless network coding systems; wireless system performance; wormhole attacks; Encoding; Network coding; Probability; Protocols; Routing; Throughput; Wireless networks

76. Secure cloud storage meets with secure network coding.

Paper Link】 【Pages】:673-681

【Authors】: Fei Chen ; Tao Xiang ; Yuanyuan Yang ; Sherman S. M. Chow

【Abstract】: This paper investigates the intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. We show in general how to construct a secure cloud storage protocol given any secure network coding protocol. Our construction suggests a systematic way to construct various secure cloud storage protocols. We also show that it is secure under a definition which captures the real world uses of the cloud storage. From our general construction, we propose a secure cloud storage protocol based on a recent secure network coding protocol. The protocol is the first publicly verifiable secure cloud storage protocol in the standard model, while the previous work is either not publicly verifiable, or security argument is only argued heuristically in the random oracle model. We also enhance the proposed protocol to support third-party public auditing, which has received considerable attention recently. Finally, we prototype the proposed protocol and evaluate its performance. Experimental results validate the effectiveness of the protocol.

【Keywords】: cloud computing; network coding; security of data; general construction; intrinsic relationship; public auditing; random oracle model; secure cloud storage protocols; secure network coding protocol; Authentication; Cloud computing; Network coding; Routing protocols; Secure storage; Cloud storage auditing; network coding; security; third-party public auditing

NE3: Network economics and pricing 3 4

77. Hybrid data pricing for network-assisted user-provided connectivity.

Paper Link】 【Pages】:682-690

【Authors】: Lin Gao ; George Iosifidis ; Jianwei Huang ; Leandros Tassiulas

【Abstract】: User-provided connectivity (UPC) is a promising paradigm to achieve a low-cost ubiquitous connectivity. In this paper, we study a network-assisted UPC service model, where a mobile virtual network operator (MVNO) enables its subscribers to operate as mobile WiFi hotspots (hosts) and provide Internet connectivity for others. A unique aspect of this service model is that the MVNO offers some free data quota to hosts as reimbursements (incentives) for connectivity sharing. This reimbursing scheme, together with a usage-based pricing, constitute a revolutionary hybrid data pricing-reimbursing scheme, which has not been considered before. We analyze the different impacts of data price and reimbursement on the host's connectivity sharing decision systematically. Based on this analysis, we further derive the optimal hybrid pricing-reimbursing policy that maximizes the MVNO's revenue. Our numerical result indicates that by using the proposed hybrid pricing policy, the MVNO can increase its revenue by 20% to 135% under an elastic client demand, and by 20% to 550% under an inelastic client demand, comparing to those achieved under a pricing-only policy.

【Keywords】: Internet; mobile computing; pricing; share prices; wireless LAN; Internet connectivity sharing; MVNO revenue maximization; elastic client demand; free data quota; inelastic client demand; low-cost ubiquitous connectivity; mobile WiFi hotspots; mobile virtual network operator; network-assisted UPC service model; network-assisted user-provided connectivity; optimal hybrid pricing-reimbursing policy; revolutionary hybrid data pricing-reimbursing scheme; usage-based pricing; Games; IEEE 802.11 Standards; Internet; Mobile communication; Optimal scheduling; Pricing; Schedules

78. EasyBid: Enabling cellular offloading via small players.

Paper Link】 【Pages】:691-699

【Authors】: Zhixue Lu ; Prasun Sinha ; R. Srikant

【Abstract】: Data offloading is an increasingly popular mechanism for meeting the rising demands of cellular users. In order to enable the small players, such as businesses and individual owners to make their services available to the bigger wireless service providers (WSPs) to help offload data, a simple, practical and easy-to-use payment machinery needs to be devised. Existing auction mechanisms usually assume that bidders can precisely estimate their true valuations, and they ignore the significant overhead to sellers incurred for obtaining a precise estimation. Such assumption is unrealistic in femtocell networks. To allow imprecise valuations, we introduce the novel concept of perceived valuation, which is a value that can be acquired by the seller at little or no cost. We further propose two novel metrics: partial truthfulness, and imprecision loss, to measure the quality of a truthful auction that accepts perceived valuations. Based on this, we propose EasyBid, a new auction model that provides guarantees for truthfulness even when considering a system with imprecise valuations. Finally, we design a dynamic programming based algorithm which aims to maximize the WSP's utility while satisfying any given constraints on partial truthfulness and imprecision loss. Through simulations, we show that the utility achieved by EasyBid with imprecise valuations can be close to the optimal solution that assumes precise valuations.

【Keywords】: dynamic programming; femtocellular radio; EasyBid auction model; WSPs; auction mechanisms; cellular offloading; data offloading; dynamic programming based algorithm; easy-to-use payment machinery; femtocell networks; imprecision loss; partial truthfulness; truthful auction quality; wireless service providers; Computers; Conferences; Cost accounting; Estimation; Mobile communication; Silicon; Wireless communication

79. Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes.

Paper Link】 【Pages】:700-708

【Authors】: Liang Zhang ; Weijie Wu ; Dan Wang

【Abstract】: With the advances of bandwidth-intensive mobile devices, we see severe congestion problems in wireless data networks. Recently, research emerges to solve this problem from a pricing point of view. Time dependent pricing has been introduced, and initial investigations have shown its advantages over the conventional time independent pricing. Nevertheless, much is unknown in how a practical and effective time dependent pricing scheme can be designed. In this paper, we explore the design space of time dependent pricing. In particular, we focus on a number of schemes, e.g., the usage-based scheme, the flat-rate scheme, and a mixture of them which we called a cap scheme. Our findings include: 1) the ISP obtains a higher profit with usage-based (or flat-rate) scheme if the capacity is insufficient (or sufficient); 2) the usage-based scheme usually achieves a higher consumer surplus and more efficient traffic utilization than the flat-rate scheme; and 3) the cap scheme is strongly preferred by the ISP to further increase its revenue. We believe our findings provide important insights for ISPs to design effective pricing schemes.

【Keywords】: mobile computing; pricing; ISP; bandwidth intensive mobile device; design space; flat rate pricing; time dependent pricing; usage based pricing; wireless data network; Bandwidth; Cost accounting; Games; Monopoly; Pricing; Sensitivity; Wireless communication

80. Double auctions for dynamic spectrum allocation.

Paper Link】 【Pages】:709-717

【Authors】: Wei Dong ; Swati Rallapalli ; Lili Qiu ; K. K. Ramakrishnan ; Yin Zhang

【Abstract】: Wireless spectrum is a precious resource and must be allocated and used efficiently. The conventional spectrum allocation lets a government (e.g., FCC) sell a given portion of spectrum to one provider. This is not only restrictive, but also limits spectrum reuse and may lead to significant under-utilization of spectrum. In this paper, we develop a novel truthful double auction scheme to let any resource owner (e.g., a cellular provider), who has spare spectrum at a given time, sell to one or more providers that need additional spectrum at that time. Spectrum auction is fundamentally different from conventional auction problems since spectrum can be re-used and competition pattern is complex due to wireless interference. We propose the first double auction design for spectrum allocation that explicitly decouples the buyer side and seller side auction design while achieving (i) truthfulness, (ii) individual rationality, and (iii) budget balance. To accurately capture wireless interference and support spectrum reuse, we partition the conflict graph so that buyers with strong direct and indirect interference are put into the same subgraph and buyers with no or weak interference are put into separate subgraphs and then compute pricing independently within each subgraph. We develop a merge scheme to combine spectrum allocation results from different subgraphs and resolve potential conflicts. Using conflict graphs generated from real cell tower locations, we extensively evaluate our approach and demonstrate that it achieves high efficiency, revenue, and utilization.

【Keywords】: electronic commerce; radio spectrum management; radiofrequency interference; resource allocation; FCC; buyer side auction design; cellular provider; double auctions; dynamic spectrum allocation; indirect interference; seller side auction design; spectrum auction; spectrum reuse; wireless interference; wireless spectrum; Clustering algorithms; Conferences; Interference; Partitioning algorithms; Pricing; Resource management; Wireless communication

SN1: Sensor networks 1 4

81. A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring.

Paper Link】 【Pages】:718-726

【Authors】: Xuefeng Liu ; Jiannong Cao ; Shaojie Tang ; Peng Guo

【Abstract】: Wireless sensor networks (WSNs) are generally used to monitor, in an area, certain phenomena which can be events or targets that users are interested. To extend the system lifetime, a widely used technique is Energy-Efficient Coverage-Preserving Scheduling(EECPS)', in which at any time, only part of the nodes are activated to fulfill the function. To determine which nodes should be activated at a certain time is the key for the EECPS and this problem has been studied extensively. Existing solutions are based on the assumption that each node has a fixed coverage area, and once the event/target occurs in this area, it can be detected by this sensor. However, this coverage model is not always valid. In some applications such as structural health monitoring (SHM) and volcano monitoring, to fulfill a required function always requires low level collaboration from multiple sensors. The coverage area for individual sensor node therefore cannot be defined explicitly since single sensor is not able to fulfill the function alone, even it is close to the event or target to be monitored. In this paper, using an example of SHM, we illustrate how to support EECPS in some special applications of WSNs. We re-define thecoverage' and based on the new coverage model, two methods are proposed to partition the deployed sensor nodes into qualified cover sets such that the system lifetime can be maximized by letting these sets work by turns. The performance of the methods is demonstrated through extensive simulation and experiment.

【Keywords】: condition monitoring; structural engineering; telecommunication power management; wireless sensor networks; EECPS; SHM; WSN; generalized coverage-preserving scheduling; multiple sensors; sensor nodes deployment; structural health monitoring; volcano monitoring; wireless sensor networks; Computers; Conferences; Genetic algorithms; Monitoring; Shape; Time-frequency analysis; Wireless sensor networks

82. SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments.

Paper Link】 【Pages】:727-735

【Authors】: Haofu Han ; Jiadi Yu ; Hongzi Zhu ; Yingying Chen ; Jie Yang ; Yanmin Zhu ; Guangtao Xue ; Minglu Li

【Abstract】: Acquiring instant vehicle speed is desirable and a corner stone to many important vehicular applications. This paper utilizes smartphone sensors to estimate the vehicle speed, especially when GPS is unavailable or inaccurate in urban environments. In particular, we estimate the vehicle speed by integrating the accelerometer's readings over time and find the acceleration errors can lead to large deviations between the estimated speed and the real one. Further analysis shows that the changes of acceleration errors are very small over time which can be corrected at some points, called reference points, where the true vehicle speed is known. Recognizing this observation, we propose an accurate vehicle speed estimation system, SenSpeed, which senses natural driving conditions in urban environments including making turns, stopping and passing through uneven road surfaces, to derive reference points and further eliminates the speed estimation deviations caused by acceleration errors. Extensive experiments demonstrate that SenSpeed is accurate and robust in real driving environments. On average, the real-time speed estimation error on local road is 1.32mph, and the offline speed estimation error is as low as 0.75mph. Whereas the average error of GPS is 3.1mph and 2.8mph respectively.

【Keywords】: Global Positioning System; acceleration measurement; accelerometers; road vehicles; sensors; smart phones; velocity measurement; GPS; SenSpeed; acceleration error; accelerometer; sensing driving condition; smartphone sensor; urban environment; vehicle speed estimation system; velocity 1.32 mph; velocity 2.8 mph; velocity 3.1 mph; Acceleration; Accelerometers; Estimation; Global Positioning System; Roads; Sensors; Vehicles

83. An optimal data collection technique for improved utility in UAS-aided networks.

Paper Link】 【Pages】:736-744

【Authors】: Ahmed E. A. A. Abdulla ; Zubair Md. Fadlullah ; Hiroki Nishiyama ; Nei Kato ; Fumie Ono ; Ryu Miura

【Abstract】: Recent technological advances in electronics, sensors, and communications devices have facilitated the proliferation of Unmanned Aircraft System (UAS)-aided applications. However, the UAS-aided communications networks are yet to receive sufficient research endeavor. In this paper, we address one of the most important research challenges pertaining to UAS-aided networks comprising adaptive modulation-capable nodes, namely how to fairly maximize the energy efficiency (throughput per energy). For the mobility pattern innate to the UAS, we demonstrate how the adaptive modulation behaves. Furthermore, we formulate the problem as a potential game that is played between the UAS and the network-nodes, and prove its stability, optimality, and convergence. Based upon the potential game, a data collection method is envisioned to maximize the energy efficiency with the fairness constraint. Additionally, we analyze the Price of Anarchy (PoA) of our proposed game. Extensive simulations exhibit the effectiveness of our proposal under varying environments.

【Keywords】: autonomous aerial vehicles; game theory; mobile robots; mobility management (mobile radio); PoA; UAS-aided communications networks; adaptive modulation-capable nodes; convergence; energy efficiency maximization; fairness constraint; mobility pattern; optimal data collection technique; optimality; potential game; price-of-anarchy; stability; unmanned aircraft system-aided applications; utility improvement; Bit error rate; Convergence; Data collection; Game theory; Games; Modulation; Signal to noise ratio

84. Toward optimal allocation of location dependent tasks in crowdsensing.

Paper Link】 【Pages】:745-753

【Authors】: Shibo He ; Dong-Hoon Shin ; Junshan Zhang ; Jiming Chen

【Abstract】: Crowdsensing offers an efficient approach to meet the demand in large scale sensing applications. In crowdsensing, it is of great interest to find the optimal task allocation, which is challenging since sensing tasks with different requirements of quality of sensing are typically associated with specific locations and mobile users are constrained by time budgets. We show that the allocation problem is NP hard. We then focus on approximation algorithms, and devise an efficient local ratio based algorithm (LRBA). Our analysis shows that the approximation ratio of the aggregate rewards obtained by the optimal allocation to those by LRBA is 5. This reveals that LRBA is efficient, since a lower (but not tight) bound on the approximation ratio is 4. We also discuss about how to decide the fair prices of sensing tasks to provide incentives since mobile users tend to decline the tasks with low incentives. We design a pricing mechanism based on bargaining theory, in which the price of each task is determined by the performing cost and market demand (i.e., the number of mobile users who intend to perform the task). Extensive simulation results are provided to demonstrate the advantages of our proposed scheme.

【Keywords】: computational complexity; game theory; mobile computing; pricing; resource allocation; wireless sensor networks; LRBA; NP hard problem; approximation algorithms; approximation ratio; bargaining theory; crowdsensing; local ratio based algorithm; location dependent task optimal allocation; lower bound; pricing mechanism; time budgets; Algorithm design and analysis; Approximation methods; Computers; Materials requirements planning; Mobile communication; Resource management; Sensors; Approximation Ratio; Crowdsensing Applications; Location Dependent Task Allocation

SP3: Security and privacy 3 4

85. Achieving k-anonymity in privacy-aware location-based services.

Paper Link】 【Pages】:754-762

【Authors】: Ben Niu ; Qinghua Li ; Xiaoyan Zhu ; Guohong Cao ; Hui Li

【Abstract】: Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the convenience provided by LBS, users may lose privacy since the untrusted LBS server has all the information about users in LBS and it may track them in various ways or release their personal data to third parties. To address the privacy issue, we propose a Dummy-Location Selection (DLS) algorithm to achieve k-anonymity for users in LBS. Different from existing approaches, the DLS algorithm carefully selects dummy locations considering that side information may be exploited by adversaries. We first choose these dummy locations based on the entropy metric, and then propose an enhanced-DLS algorithm, to make sure that the selected dummy locations are spread as far as possible. Evaluation results show that the proposed DLS algorithm can significantly improve the privacy level in terms of entropy. The enhanced-DLS algorithm can enlarge the cloaking region while keeping similar privacy level as the DLS algorithm.

【Keywords】: data privacy; mobile computing; DLS algorithm; cloaking region; dummy-location selection algorithm; entropy metric; k-anonymity; privacy-aware location-based services; untrusted LBS server; user information; Algorithm design and analysis; Computers; Conferences; Entropy; Measurement; Privacy; Servers

86. PLAM: A privacy-preserving framework for local-area mobile social networks.

Paper Link】 【Pages】:763-771

【Authors】: Rongxing Lu ; Xiaodong Lin ; Zhiguo Shi ; Jun Shao

【Abstract】: In this paper, we propose a privacy-preserving framework, called PLAM, for local-area mobile social networks. The proposed PLAM framework employs a privacy-preserving request aggregation protocol with k-Anonymity and l-Diversity properties while without involving a trusted anonymizer server to keep user preference privacy when querying location-based service (LBS), and integrates unlinkable pseudo-ID technique to achieve user identity privacy, location privacy. Moreover, the proposed PLAM framework also introduces the privacy-preserving and verifiable polynomial computation to keep LBS provider's functions private while preventing the provider from cheating in computation. Detailed security analysis shows that the proposed PLAM framework can not only achieve desirable privacy requirements but also resist outside attacks on source authentication, data integrity and availability. In addition, extensive simulations are also conducted, and simulation results guide us on how to set proper thresholds for k-anonymity, l-diversity to make a tradeoff between the desirable user preference privacy level and the request delay in different scenarios.

【Keywords】: cryptography; data integrity; data privacy; local area networks; mobile computing; polynomials; protocols; social networking (online); trusted computing; LBS; LBS provider functions; PLAM framework; data availability; data integrity; k-anonymity; l-diversity; local-area mobile social networks; location privacy; location-based service; privacy-preserving request aggregation protocol; request delay; security analysis; source authentication; trusted anonymizer server; unlinkable pseudo-ID technique; user identity privacy; user preference privacy level; verifiable polynomial computation; Data privacy; Mobile communication; Mobile computing; Polynomials; Privacy; Protocols; Security; Privacy-preserving; location-based services; mobile social network; preference privacy

87. Preserving secondary users' privacy in cognitive radio networks.

Paper Link】 【Pages】:772-780

【Authors】: Zhengrui Qin ; Shanhe Yi ; Qun Li ; Dmitry Zamkov

【Abstract】: Cognitive radio plays an important role in improving spectrum utilization in wireless services. In the cognitive radio paradigm, secondary users (SUs) are allowed to utilize licensed spectrum opportunistically without interfering with primary users (PUs). To motivate PU to share licensed spectrum with SU, it is reasonable for SU to pay PU a fee whenever the former is utilizing the latter's licensed spectrum. SU's detailed usage information, such as when and how long the licensed spectrum is utilized, is needed for PU to calculate payment. Providing usage information to PU, however, may compromise SU's privacy. To solve this dilemma, we are the first to propose a novel privacy-preserving mechanism for cognitive radio transactions through commitment scheme and zero-knowledge proof. This mechanism, on one hand, only allows PU to know the total payment to SU for a billing period, plus a little portion of SU's usage information. On the other hand, it guarantees PU that the payment is correctly calculated. We have implemented our mechanism and evaluated its performance.

【Keywords】: cognitive radio; data privacy; radio spectrum management; telecommunication security; cognitive radio networks; cognitive radio transactions; commitment scheme; licensed spectrum; privacy preserving mechanism; secondary users privacy; usage information; zero knowledge proof; Cognitive radio; Computers; Conferences; Monitoring; Pricing; Privacy; Protocols

88. Markov chain fingerprinting to classify encrypted traffic.

Paper Link】 【Pages】:781-789

【Authors】: Maciej Korczynski ; Andrzej Duda

【Abstract】: In this paper, we propose stochastic fingerprints for application traffic flows conveyed in Secure Socket Layer/Transport Layer Security (SSL/TLS) sessions. The fingerprints are based on first-order homogeneous Markov chains for which we identify the parameters from observed training application traces. As the fingerprint parameters of chosen applications considerably differ, the method results in a very good accuracy of application discrimination and provides a possibility of detecting abnormal SSL/TLS sessions. Our analysis of the results reveals that obtaining application discrimination mainly comes from incorrect implementation practice, the misuse of the SSL/TLS protocol, various server configurations, and the application nature.

【Keywords】: Internet; Markov processes; computer network security; cryptographic protocols; fingerprint identification; Markov chain fingerprinting; SSL/TLS protocol; SSL/TLS sessions; encrypted traffic classification; fingerprint parameters; secure socket layer/transport layer security; stochastic fingerprints; Ciphers; Markov processes; Protocols; Servers; Twitter

WN3: Wireless networks 3 4

89. 3D pipeline contention: Asymmetric full duplex in wireless networks.

Paper Link】 【Pages】:790-798

【Authors】: Shaohe Lv ; Xuan Dong ; Yong Lu ; Xiaoli Du ; Xiaodong Wang ; Yong Dou ; Xingming Zhou

【Abstract】: Coordination among users is an indispensable part in wireless networks for efficient medium access. Alone with the rapid increase of transmission rate, however, coordination time becomes insufferable. We present AFD, namely asymmetric full duplex, to achieve high coordination efficiency at nearly zero overhead. In AFD, channel contention is performed simultaneously with data transmission. We propose a 3D pipeline contention scheme where the contention process is divided into several parallel stages and executed in a pipelined manner in a 3D domain specified by time, frequency and spatial antenna. To mitigate the interference between the data packet and the contention signal, we adopt a singleton PN sequence as a contention pilot. AFD provides a novel network-scale full duplex capability. The performance is evaluated by both simulations and measurements in a testbed. AFD outperforms IEEE 802.11 significantly, i.e., the Jain's fairness index is around 0.95 with a throughput gain up to 120%.

【Keywords】: antennas; carrier sense multiple access; data communication; pipeline processing; radio networks; time-frequency analysis; wireless channels; 3D domain; 3D pipeline contention scheme; AFD; Jain fairness index; asymmetric full duplex; channel contention; data packet; data transmission; frequency domain; interference mitigation; medium access; network-scale full duplex capability; singleton PN sequence; spatial antenna; time domain; wireless networks; Antennas; Data communication; IEEE 802.11 Standards; Interference; Pipelines; Three-dimensional displays; Time-frequency analysis

90. Montage: Combine frames with movement continuity for realtime multi-user tracking.

Paper Link】 【Pages】:799-807

【Authors】: Lan Zhang ; Kebin Liu ; Yonghang Jiang ; Xiang-Yang Li ; Yunhao Liu ; Panlong Yang

【Abstract】: In this work we design and develop Montage for real-time multi-user formation tracking and localization by off-the-shelf smartphones. Montage achieves submeter-level tracking accuracy by integrating temporal and spatial constraints from user movement vector estimation and distance measuring. In Montage we designed a suite of novel techniques to surmount a variety of challenges in real-time tracking, without infrastructure and fingerprints, and without any a priori user-specific (e.g., stride-length and phone-placement) or site-specific (e.g., digitalized map) knowledge. We implemented, deployed and evaluated Montage in both outdoor and indoor environment. Our experimental results (847 traces from 15 users) show that the stride-length estimated by Montage over all users has error within 9cm, and the moving-direction estimated by Montage is within 20°. For realtime tracking, Montage provides meter-second-level formation tracking accuracy with off-the-shelf mobile phones.

【Keywords】: smart phones; target tracking; meter-second-level formation tracking accuracy; mobile phones; movement continuity; moving-direction estimation; real-time multiuser formation tracking; smartphones; spatial constraints; submeter-level tracking; temporal constraints; user movement vector estimation; Acceleration; Acoustics; Distance measurement; Earth; Topology; Tracking; Vectors

91. Scalable user selection for MU-MIMO networks.

Paper Link】 【Pages】:808-816

【Authors】: Xiufeng Xie ; Xinyu Zhang

【Abstract】: In a multi-user MIMO (MU-MIMO) network, an AP with M antennas can only serve up to M users out of a large user population. The M users' rates are inter-coupled and depend on their channel orthogonality. Substantial theoretical studies focused on selecting users to maximize capacity, but they require feedback of channel state information (CSI) from all users. The resulting overhead can easily overwhelm useful data in large scale networks. In this paper, we propose a scalable user selection mechanism called orthogonality probing based user selection (OPUS). OPUS only requires up to M rounds of CSI feedback. In each round, it employs a novel probing mechanism that enables a user to evaluate its orthogonality with existing users, and a distributed contention mechanism that singles out the best user to feedback its CSI. Software-radio based implementation and experimentation shows that OPUS significantly outperforms traditional user selection schemes in both throughput and fairness.

【Keywords】: MIMO communication; antennas; feedback; software radio; wireless channels; AP; CSI feedback; MU-MIMO networks; OPUS; access point; antennas; channel orthogonality; channel state information; distributed contention mechanism; large scale networks; multiuser MIMO network; orthogonality probing based user selection; scalable user selection mechanism; software-radio based implementation; Antennas; Downlink; Interference; MIMO; Measurement; Signal to noise ratio; Vectors

92. iBeam: Intelligent client-side multi-user beamforming in wireless networks.

Paper Link】 【Pages】:817-825

【Authors】: Yongjiu Du ; Ehsan Aryafar ; Joseph Camp ; Mung Chiang

【Abstract】: Frequently, client-side wireless devices have a view of multiple WiFi access points, whether from open residential and commercial networks, corporate networks, or mesh networks. Given the increasing number of radios and antennas in today's wireless devices, residual capacity from these multiple APs could be leveraged if client devices communicate with multiple APs simultaneously. In this paper, we exploit multi-user multi-input multi-output (MU-MIMO) technology to improve throughput and reliability in both directions of a wireless connection. For uplink, we use multi-user beamforming to enable the client devices to send multiple data streams to multiple APs simultaneously. For downlink, we leverage interference nulling technology to allow the client devices to decode parallel packets from multiple APs. This iBeam system requires no changes to existing APs or backhaul networks and is compatible with the IEEE 802.11 standards. We experimentally evaluate iBeam and show significant throughput improvements over both single-AP connections and multi-AP connections in a time division mode. The client's reliability and stability are also significantly improved due to the multi-AP diversity gain.

【Keywords】: MIMO communication; array signal processing; diversity reception; interference suppression; multi-access systems; telecommunication network reliability; wireless LAN; IEEE 802.11 standard; MIMO technology; diversity gain; iBeam; intelligent client side beamforming; interference nulling technology; multiple WiFi access point; multiple input multiple output technology; multiuser beamforming; parallel packet decoding; wireless networks; Antennas; Array signal processing; IEEE 802.11 Standards; Interference; Throughput; Uplink; Wireless communication; Beamforming; Channel Reciprocity; Interference Nulling; Multi-AP; Multi-user; Rate Adaptation; WiFi Networks

CC4: Cloud computing 4 4

93. TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes.

Paper Link】 【Pages】:826-834

【Authors】: Guanfeng Liang ; Ulas C. Kozat

【Abstract】: Our paper presents solutions using erasure coding, parallel connections to storage cloud and limited chunking (i.e., dividing the object into a few smaller segments) together to significantly improve the delay performance of uploading and downloading data in and out of cloud storage. TOFEC is a strategy that helps front-end proxy adapt to level of workload by treating scalable cloud storage (e.g. Amazon S3) as a shared resource requiring admission control. Under light workloads, TOFEC creates more smaller chunks and uses more parallel connections per file, minimizing service delay. Under heavy workloads, TOFEC automatically reduces the level of chunking (fewer chunks with increased size) and uses fewer parallel connections to reduce overhead, resulting in higher throughput and preventing queueing delay. Our trace-driven simulation results show that TOFEC's adaptation mechanism converges to an appropriate code that provides the optimal delay-throughput trade-off without reducing system capacity. Compared to a non-adaptive strategy optimized for throughput, TOFEC delivers 2.5× lower latency under light workloads; compared to a non-adaptive strategy optimized for latency, TOFEC can scale to support over 3× as many requests.

【Keywords】: cloud computing; queueing theory; resource allocation; Amazon S3; TOFEC; TOFEC adaptation mechanism; admission control; chunking level; data downloading; data uploading; delay performance improvement; erasure coding; front-end proxy; heavy-workloads; latency reduction; light-workloads; optimal throughput-delay trade-off; overhead reduction; parallel connections; queueing delay prevention; resource sharing; scalable cloud storage; service delay minimization; throughput; trace-driven simulation; workload level; Cloud computing; Correlation; Delays; Encoding; Standards; Strips; Throughput; Cloud storage; Delay; FEC; Queueing

94. New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants.

Paper Link】 【Pages】:835-843

【Authors】: Haiying Shen ; Zhuozhao Li

【Abstract】: For predictable application performance or fairness in network sharing in clouds, many bandwidth allocation policies have been proposed. However, with these policies, tenants are not incentivized to use idle bandwidth or prevent link congestion, and may even take advantage of the policies to gain unfair bandwidth allocation. Increasing network utilization while avoiding congestion not only benefits cloud provider but also the tenants by improving application performance. In this paper, we propose a new pricing model that sets different unit prices for reserved bandwidth, the bandwidth on congested links and on uncongested links, and makes the unit price for congested links proportional to their congestion degrees. We use game theory model to analyze tenants' behaviors in our model and the current pricing models, which shows the effectiveness of our model in providing the incentives. With the pricing model, we propose a network sharing policy to achieve both min-guarantee and proportionality, while prevent tenants from earning unfair bandwidth. We further propose methods for each virtual machine to arrange its traffic to maximize its utility. As a result, our solution creates a win-win situation, where tenants strive to increase their benefits in bandwidth sharing, which also concurrently increases the utilities of cloud provider and other tenants. Our simulation and trace-driven experimental results show the effectiveness of our solution in creating the win-win situation.

【Keywords】: cloud computing; game theory; operating systems (computers); virtual machines; bandwidth allocation; bandwidth allocation policies; bandwidth sharing; cloud provider; cloud tenants; game theory model; link congestion; network sharing; network sharing policy; pricing models; pricing policies; virtual machine; win-win situation; Analytical models; Bandwidth; Barium; Channel allocation; Computers; Pricing; Resource management

95. Neptune: Efficient remote communication services for cloud backups.

Paper Link】 【Pages】:844-852

【Authors】: Yu Hua ; Xue Liu ; Dan Feng

【Abstract】: In order to efficiently achieve fault tolerance in cloud computing, large-scale data centers generally leverage remote backups to improve system reliability. Due to longdistance and expensive network transmission, the backups incur heavy communication overheads and potential errors. To address this important problem, we propose an efficient remote communication service, called Neptune. Neptune efficiently transmits massive data between long-distance data centers via a cost-effective filtration scheme. The filtration in Neptune is interpreted as eliminating redundancy and compressing similarity of files, which are generally studied independently in existing work. In order to bridge the gap between them, Neptune leverages chunk-level deduplication to eliminates duplicate files, and approximate delta compression to compresses similar files. Moreover, in order to reduce the complexity and overheads, Neptune uses a locality-aware hashing to group similar files and proposes shortcut delta chains for fast remote recovery. We have really implemented Neptune. We examine the Neptune performance by using real-world traces of LANL, HP, MSN and Google. Compared with state-of-the-art work, experimental results demonstrate the efficiency and efficacy of Neptune.

【Keywords】: cloud computing; computer centres; file organisation; software fault tolerance; Google; HP; LANL; MSN; Neptune; cloud backups; cloud computing; duplicate files; fault tolerance; large-scale data centers; locality-aware hashing; long-distance data centers; remote communication services; system reliability; Bandwidth; Computers; Containers; Indexes; Servers; Throughput; Vectors

96. Dynamic content allocation for cloud-assisted service of periodic workloads.

Paper Link】 【Pages】:853-861

【Authors】: György Dán ; Niklas Carlsson

【Abstract】: Motivated by improved models for content workload prediction, in this paper we consider the problem of dynamic content allocation for a hybrid content delivery system that combines cloud-based storage with low cost dedicated servers that have limited storage and unmetered upload bandwidth. We formulate the problem of allocating contents to the dedicated storage as a finite horizon dynamic decision problem, and show that a discrete time decision problem is a good approximation for piecewise stationary workloads. We provide an exact solution to the discrete time decision problem in the form of a mixed integer linear programming problem, propose computationally feasible approximations, and give bounds on their approximation ratios. Finally, we evaluate the algorithms using synthetic and measured traces from a commercial music on-demand service and give insight into their performance as a function of the workload characteristics.

【Keywords】: cloud computing; integer programming; linear programming; approximation ratios; cloud-assisted service; cloud-based storage; commercial music on-demand service; content workload prediction; discrete time decision problem; dynamic content allocation; finite horizon dynamic decision problem; hybrid content delivery system; mixed integer linear programming problem; Aggregates; Approximation methods; Bandwidth; Optimization; Resource management; Servers; Steady-state

CNE: Cooperative networking 3

97. WiSlow: A Wi-Fi network performance troubleshooting tool for end users.

Paper Link】 【Pages】:862-870

【Authors】: Kyung-Hwa Kim ; Hyunwoo Nam ; Henning Schulzrinne

【Abstract】: Slow Internet connectivity is often caused by poor Wi-Fi performance. The main reasons of such performance degradation include channel contention and non-Wi-Fi interference. Although these problem sources can be easily removed in many cases once they are discovered, it is difficult for end users to identify the sources of such interference. We investigated the characteristics of different sources that can degrade Wi-Fi performance, and developed WiSlow, a software tool that diagnoses the root causes of poor Wi-Fi performance using user-level network probes, and leveraging peer collaboration to identify the physical location of these causes. WiSlow uses two main methods: packet loss analysis and 802.11 ACK number analysis. The accuracy of WiSlow exceeds 90% when the sources are close to Wi-Fi devices. Also, our experiment proves that the collaborative approach is feasible for determining the relative location of an interfering device.

【Keywords】: Internet; computer network performance evaluation; packet radio networks; radiofrequency interference; wireless LAN; 802.11 ACK number analysis; Internet connectivity; Wi-Fi network performance; WiSlow; channel contention; nonWi-Fi interference; packet loss analysis; troubleshooting tool; user-level network probes; Bit rate; IEEE 802.11 Standards; Interference; Monitoring; Packet loss; Pediatrics

98. Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users.

Paper Link】 【Pages】:871-879

【Authors】: Riheng Jia ; Jinbei Zhang ; Xinbing Wang ; Xiaohua Tian ; Qian Zhang

【Abstract】: Cognitive radio (CR) technique is considered an effective mechanism to relieve the spectrum scarcity issue, where the secondary users (SUs) can utilize the idle spectrum of the primary users (PUs). How the performance of the wireless network will be influenced by the introduction of CR technique has been attracting much attention in past years. While many efforts have been made to study the cognitive radio network, where the data source and the destination (S-D) is homogeneously distributed, the research on cognitive radio networks (CRN) with heterogeneous S-D distribution is still very limited. In this paper, we investigate the throughput and delay scaling law in the heterogeneous cognitive radio network (HCRN), where the S-D pair follows a rank based model and SUs provide relay service for PUs in reciprocating the utilization of PUs' idle spectrum. By applying a cellular TDMA scheduling scheme, we show that the primary network throughput is the same for different heterogeneous extents of S-D distribution owing to the flexible assistance of SUs, while the throughput of secondary networks is proven to be changing with respect to the S-D heterogeneity exponent denoted by α. In addition, the delay scaling are derived for both primary and secondary networks and shown to be altering in accordance with α. Further, we reveal that the density of SUs required to assist PUs can be dramatically reduced when considering the S-D heterogeneity, while achieving the same primary network throughput.

【Keywords】: cellular radio; cognitive radio; radio spectrum management; relay networks (telecommunication); scheduling; time division multiple access; CR technique; HCRN; PU idle spectrum; S-D heterogeneity exponent; SUs; cellular TDMA scheduling scheme; cooperative secondary users; data sourc-destination; delay scaling law; heterogeneous S-D distribution; heterogeneous cognitive radio networks; primary network throughput; primary users; rank based model; relay service; secondary networks; spectrum scarcity; throughput scaling laws; wireless network; Cognitive radio; Delays; Equations; Mathematical model; Protocols; Relays; Throughput

99. Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.

Paper Link】 【Pages】:880-888

【Authors】: Yantian Hou ; Ming Li ; Xu Yuan ; Y. Thomas Hou ; Wenjing Lou

【Abstract】: This paper explores a new paradigm for the coexistence among heterogeneous multi-hop networks in unplanned deployment settings, called cooperative interference mitigation (CIM). CIM exploits recent advancements in physical layer technologies such as technology-independent multiple output (TIMO), making it possible for disparate networks to cooperatively mitigate the interference to each other to enhance everyone's performance, even if they possess different wireless technologies. This paper offers a thorough study of the CIM paradigm for unplanned multi-hop networks. We first show the feasibility of CIM among heterogeneous multi-hop networks by exploiting only channel ratio information, and then establish a tractable model to accurately characterize the CIM behaviors of both networks. We also develop a bi-criteria optimization formulation to maximize both networks' throughput, and propose a new methodology to compute the Pareto-optimal throughput curve as performance bound. Simulation results show that CIM provides significant performance gains to both networks compared with the traditional interference-avoidance paradigm.

【Keywords】: Pareto optimisation; cooperative communication; interference suppression; radio networks; CIM; Pareto-optimal throughput curve; TIMO; bi-criteria optimization formulation; channel ratio information; cooperative cross-technology interference mitigation; heterogeneous multihop networks; interference-avoidance paradigm; network throughput; performance bound; physical layer technology; technology-independent multiple output; unplanned multihop networks; wireless technology; Computer integrated manufacturing; Integrated circuits; Interference; MIMO; Receivers; Spread spectrum communication; Throughput

EE1: Energy efficiency in wireless networks 1 4

100. On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks.

Paper Link】 【Pages】:889-897

【Authors】: Ashikur Rahman ; Nael B. Abu-Ghazaleh

【Abstract】: Topology Control (TC) algorithms for multi-hop wireless networks create a connected communication subgraph that satisfies some topological properties by assigning appropriate transmission power to each node. A topology is said to be minimum-energy path-preserving if it preserves minimum energy paths between every pair of nodes. Creating minimum-energy path-preserving sparse topologies is a fundamental research problem in TC that has been addressed in several recent research works. Although sparseness is a key metric in comparing the performance of such algorithms, none of these prior works provides analytical models to determine the sparseness. In this paper, we provide a generic analytical model for evaluating sparseness of such topologies. The derived analytical expressions are useful in determining topology size without running simulations or prior to the deployment of real systems. Moreover, we demonstrate how to analytically couple sparseness of topologies with the radio transceiver parameters. The analytical expressions are validated through extensive simulation experiments.

【Keywords】: graph theory; network theory (graphs); radio networks; telecommunication network topology; TC algorithm; connected communication subgraph; expected topology size; generic analytical model; minimum-energy path-preserving sparse topology; radio transceiver parameters; topology control algorithms; transmission power; wireless multihop networks; Analytical models; Computers; Conferences; Network topology; Relays; Topology; Wireless networks

101. Distributed opportunistic scheduling for wireless networks powered by renewable energy sources.

Paper Link】 【Pages】:898-906

【Authors】: Hang Li ; Chuan Huang ; Shuguang Cui ; Junshan Zhang

【Abstract】: This paper considers an ad hoc network with multiple transmitter-receiver pairs, in which all transmitters are capable of harvesting renewable energy from the environment and compete for the same channel by random access. To quantify the roles of both the energy state information (ESI) and the channel state information (CSI), a distributed opportunistic scheduling (DOS) framework with a save-then-transmit scheme is proposed. First, in the channel probing stage, each transmitter probes the CSI via channel contention; next, in the data transmission stage, the successful transmitter decides to either give up the channel (if the expected reward calculated over the CSI and ESI is small) or hold and utilize the channel by optimally exploring the energy harvesting and data transmission tradeoff. With a constant energy arrival model, i.e., the energy harvesting rate keeps identical over the time of interest, the expected throughput maximization problem is formulated as an optimal stopping problem, whose solution is shown to exist and have a threshold-based structure, for both the homogeneous and heterogenous cases. Furthermore, we prove that there exists a steady-state distribution for the stored energy level at each transmitter, and propose an efficient iterative algorithm for its computation. Finally, we show via numerical results that the proposed scheme can achieve a potential 175% throughput gain compared with the method of best-effort delivery.

【Keywords】: ad hoc networks; data communication; energy harvesting; radio receivers; radio transmitters; renewable energy sources; scheduling; CSI; DOS framework; ESI; ad hoc network; channel contention; channel probing stage; channel state information; data transmission; distributed opportunistic scheduling; energy state information; harvesting renewable energy sources; iterative algorithm; multiple transmitter-receiver pairs; save-then-transmit scheme; steady-state distribution; wireless networks; Batteries; Bismuth; Data communication; Energy states; Steady-state; Throughput; Transmitters

102. Relax, but Do Not Sleep: A new perspective on Green Wireless Networking.

Paper Link】 【Pages】:907-915

【Authors】: Chenfei Gao ; Weiyi Zhang ; Jian Tang ; Chonggang Wang ; Shihong Zou ; Sen Su

【Abstract】: Saving power on base stations (BS) becomes a critical issue in wireless cellular networks. Many existing work has proposed to schedule BS into sleep to save energy. However, in reality, it is very difficult to shut down and reboot BSs frequently due to numerous technical issues and performance requirements. In this work, we propose a much more practical solution and offer a new perspective on implementing Green Wireless Networking by embracing the hot-trended small cell network idea. Instead of putting BSs into sleep, we tactically reduce the coverage (and the power usage) of each BS, and strategically place microcells (relay stations) to offload the traffic transmitted to/from BSs in order to save total power consumption. We propose approximation algorithms for various network design scenarios, with different wireless network setups and different power saving optimization objectives. Extensive numerical results are presented to confirm our theoretical analysis.

【Keywords】: cellular radio; energy conservation; power consumption; relay networks (telecommunication); telecommunication power management; telecommunication traffic; base stations; green wireless networking; microcells; power consumption; power saving; relay stations; wireless cellular networks; Base stations; Energy consumption; Green products; Power demand; Relays; Wireless networks

103. Energy optimization through traffic aggregation in wireless networks.

Paper Link】 【Pages】:916-924

【Authors】: Wenjie Hu ; Guohong Cao

【Abstract】: Cellular networks can provide pervasive data access for smartphones, but also consume lots of energy, because the cellular interface has to stay in high power state for a long time (called long tail problem) after a data transmission. In this paper, we propose to reduce the tail energy by aggregating the data traffic of multiple nodes using their P2P interfaces. This traffic aggregation problem is formalized as finding the best task schedule to minimize energy. We first propose an A* search algorithm, which can reduce the search space for finding the optimal schedule offline, and then introduce an online traffic aggregation algorithm. We have implemented the online traffic aggregation algorithm on Android smartphones, and have built a small testbed. Trace-driven simulations and Experimental results show that our traffic aggregation algorithm can significantly reduce the energy and delay.

【Keywords】: cellular radio; optimisation; smart phones; telecommunication power management; A* search algorithm; Android smart phone; P2P interface; cellular network; energy optimization; long tail problem; online traffic aggregation algorithm; pervasive data; search space reduction; tail energy reduction; wireless network; Abstracts; Computational modeling; Computers; Conferences; Delays; Energy measurement; Schedules

IM2: Internet monitoring and measurement 2 4

104. Contextual localization through network traffic analysis.

Paper Link】 【Pages】:925-933

【Authors】: Aveek K. Das ; Parth H. Pathak ; Chen-Nee Chuah ; Prasant Mohapatra

【Abstract】: The rise of location-based services has enabled many opportunities for content service providers to optimize the content delivery based on user's location. Since sharing precise location remains a major privacy concern among the users, many location-based services rely on contextual location (e.g. residence, cafe etc.) as opposed to acquiring user's exact physical location. In this paper, we present PACL (Privacy-Aware Contextual Localizer), which can learn user's contextual location just by passively monitoring user's network traffic. PACL can discern a set of vital attributes (statistical and application-based) from user's network traffic, and predict user's contextual location with a very high accuracy. We design and evaluate PACL using real-world network traces of over 1700 users with over 100 gigabytes of total data. Our results show that PACL (built using decision tree) can predict user's contextual location with the accuracy of around 87%.

【Keywords】: data privacy; mobile computing; mobility management (mobile radio); contextual localization; location based services; network traffic analysis; privacy aware contextual localizer; user exact physical location; user location; user network traffic; vital attribute; Airports; IEEE 802.11 Standards; IP networks; Mobile radio mobility management; Monitoring; Predictive models; Privacy

105. Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP).

Paper Link】 【Pages】:934-942

【Authors】: Mehdi Malboubi ; Liyuan Wang ; Chen-Nee Chuah ; Puneet Sharma

【Abstract】: Fine-grained traffic flow measurement, which provides useful information for network management tasks and security analysis, can be challenging to obtain due to monitoring resource constraints. The alternate approach of inferring flow statistics from partial measurement data has to be robust against dynamic temporal/spatial fluctuations of network traffic. In this paper, we propose an intelligent Traffic (de)Aggregation and Measurement Paradigm (iSTAMP), which partitions TCAM entries of switches/routers into two parts to: 1) optimally aggregate part of incoming flows for aggregate measurements, and 2) de-aggregate and directly measure the most informative flows for per-flow measurements. iSTAMP then processes these aggregate and per-flow measurements to effectively estimate network flows using a variety of optimization techniques. With the advent of Software-Defined-Networking (SDN), such real-time rule (re)configuration can be achieved via OpenFlow or other similar SDN APIs. We first show how to design the optimal aggregation matrix for minimizing the flow-size estimation error. Moreover, we propose a method for designing an efficient-compressive flow aggregation matrix under hard resource constraints of limited TCAM sizes. In addition, we propose an intelligent Multi-Armed Bandit based algorithm to adaptively sample the most “rewarding” flows, whose accurate measurements have the highest impact on the overall flow measurement and estimation performance. We evaluate the performance of iSTAMP using real traffic traces from a variety of network environments and by considering two applications: traffic matrix estimation and heavy hitter detection. Also, we have implemented a prototype of iSTAMP and demonstrated its feasibility and effectiveness in Mininet environment.

【Keywords】: content-addressable storage; optimisation; software radio; telecommunication network management; telecommunication traffic recording; Mininet environment; OpenFlow; TCAM; flow aggregation matrix; flow-size estimation error; heavy hitter detection; iSTAMP; intelligent SDN traffic aggregation and measurement paradigm; intelligent multiarmed bandit based algorithm; network management; network traffic; per-flow measurements; security analysis; software defined networking; traffic flow measurement; traffic matrix estimation; Accuracy; Aggregates; Estimation; Heuristic algorithms; Monitoring; Optimization; Routing

106. Separating wheat from chaff: Winnowing unintended prefixes using machine learning.

Paper Link】 【Pages】:943-951

【Authors】: Andra Lutu ; Marcelo Bagnulo ; Jesús Cid-Sueiro ; Olaf Maennel

【Abstract】: In this paper, we propose the use of prefix visibility at the interdomain level as an early symptom of anomalous events in the Internet. We focus on detecting anomalies which, despite their significant impact on the routing system, remain concealed from state of the art tools. We design a machine learning system to winnow the prefixes with unintended limited visibility - symptomatic of anomalous events - from the prefixes with intended limited visibility - resulting from legitimate routing operations. We train a winnowing algorithm with ground-truth data on 20,000 operational limited visibility prefixes (LVPs) already classified by the operators of the origin networks. The ground-truth was collected using the BGP Visibility Scanner, a tool we developed to provide operators with a multi-angle view on the efficacy of their routing policies. We build a dataset with the pre-classified prefixes and the features describing their visibility status dynamics. We further use this dataset to derive a boosted decision tree which winnows unintended LVPs with an accuracy of 95%.

【Keywords】: Internet; computer network security; decision trees; internetworking; learning (artificial intelligence); routing protocols; BGP visibility scanner; Internet; anomalous events; anomaly detection; boosted decision tree; border gateway protocol; ground-truth data; intended limited visibility; interdomain level; legitimate routing operations; machine learning system; operational limited visibility prefixes; preclassified prefixes; routing policies; routing system; unintended LVP; unintended limited visibility; visibility status dynamics; winnowing algorithm; Algorithm design and analysis; Feeds; Internet; Machine learning algorithms; Monitoring; Routing; Training

107. An overlay automata approach to regular expression matching.

Paper Link】 【Pages】:952-960

【Authors】: Alex X. Liu ; Eric Torng

【Abstract】: Regular expression (RegEx) matching, the core operation of intrusion detection and prevention systems, remains a fundamentally challenging problem. A desired RegEx matching scheme should satisfy four requirements: DFA speed, NFA size, automated construction, and scalable construction. Despite lots of work on RegEx matching, no prior scheme satisfies all four of these requirements. In this paper, we approach this holy grail by proposing OverlayCAM, a RegEx matching scheme that satisfies all four requirements. The theoretical underpinning of our scheme is OD2FA, a new automata model proposed in this paper that captures both state and transition replication inherent in DFAs. Our RegEx matching solution processes one input character per lookup like a DFA, requires only the space of an NFA, is grounded in sound automata models, is easy to deploy in existing network devices, and comes with scalable and automated construction algorithms.

【Keywords】: automata theory; pattern matching; security of data; DFA speed requirement; NFA size requirement; OD2FA automata model; OverlayCAM scheme; RegEx matching; automated construction requirement; intrusion detection and prevention systems; overlay automata approach; regular expression matching; scalable construction requirement; Automata; Computers; Conferences; Explosions; Memory management; Random access memory; Security

SN2: Sensor networks 2 4

108. Walking down the STAIRS: Efficient collision resolution for wireless sensor networks.

Paper Link】 【Pages】:961-969

【Authors】: Xiaoyu Ji ; Yuan He ; Jiliang Wang ; Wei Dong ; Xiaopei Wu ; Yunhao Liu

【Abstract】: Collision resolution is a crucial issue in wireless sensor networks. The existing approaches of collision resolution have drawbacks with respect to energy efficiency and processing latency. In this paper, we propose ST AIRS, a time and energy efficient collision resolution mechanism for wireless sensor networks. STAIRS incorporates the constructive interference technique in its design and explicitly forms superimposed colliding signals. Through extensive observations and theoretical analysis, we show that the RSSI of the superimposed signals exhibit stairs-like phenomenon with different number of contenders. That principle offers an attractive feature to efficiently distinguish multiple contenders and in turn makes collision-free schedules for channel access. In the design and implementation of STAIRS, we address practical challenges such as contenders alignment, online detection of RSSI change points, and fast channel assignment. The experiments on real testbed show that STARIS realizes fast and effective collision resolution, which significantly improves the network performance in terms of both latency and throughput.

【Keywords】: channel allocation; radiofrequency interference; wireless sensor networks; RSSI change points; STAIRS; collision-free schedules; constructive interference technique; contenders alignment; energy efficient collision resolution mechanism; fast channel assignment; network performance; network throughput; wireless sensor networks; Image edge detection; Interference; Receivers; Schedules; Signal resolution; Synchronization; Wireless sensor networks

109. Critical sensing range for mobile heterogeneous camera sensor networks.

Paper Link】 【Pages】:970-978

【Authors】: Yitao Hu ; Xinbing Wang ; Xiaoying Gan

【Abstract】: In camera sensor networks (CSNs), full view coverage, in which any direction of any point in the operational region is covered by at least one camera sensor, is of great significance since image shot at the frontal viewpoint considerably increases the possibility to recognize the object. However, finding the critical condition to achieve full view coverage in mobile heterogeneous CSNs remains an open question. In this paper, we analyze both the static and mobile random deployed camera sensor networks. A centralized parameter - equivalent sensing radius (ESR) - is defined to evaluate the critical requirement for asymptotic full view coverage in heterogeneous CSNs. We derive the critical sensing range for full view coverage under static model, 2-dimensional random walk mobility model, 1-dimensional random walk mobility model and random rotating model. We then discuss the impact of various mobility patterns on sensing energy consumption and study the relationship between ESR and percentage of full view coverage, and show that random walk mobility model can decrease the sensing energy consumption under certain delay tolerance. To our knowledge, our work is the very first that derive the critical condition to achieve full view coverage in mobile heterogeneous CSNs.

【Keywords】: mobility management (mobile radio); object recognition; random processes; sensor placement; video cameras; visual communication; wireless sensor networks; ESR; asymptotic full view coverage; centralized parameter; critical sensing range; equivalent sensing radius; mobile heterogeneous CSN; mobile heterogeneous camera sensor network; mobile random deployed camera sensor network; mobility patterns; object recognition; random rotating model; random walk mobility model; static random deployed camera sensor network; Cameras; Computers; Mobile communication; Mobile computing; Numerical models; Robot sensing systems

110. Bounded stretch geographic homotopic routing in sensor networks.

Paper Link】 【Pages】:979-987

【Authors】: Kan Huang ; Chien-Chun Ni ; Rik Sarkar ; Jie Gao ; Joseph S. B. Mitchell

【Abstract】: Homotopic routing asks for a path going around holes according to a given “threading”. Paths of different homo-topy types can be used to improve load balancing and routing resilience. We propose the first lightweight homotopic routing scheme that generates constant bounded stretch compared to the shortest path of the same homotopy type. Our main insight is that in a sequence of triangles to traverse, a message always routed to the nearest point on the next triangle in the sequence travels at most a constant times the length of any shortest path going through the same sequence of triangles. Our routing scheme operates on two levels enabled by a coarse triangulation. The top level is used to specify and represent the requested homotopy type, while the bottom level executes the local greedy routing on a triangle sequence. After a preprocessing step that triangulates the given region and creates a minimum-size auxiliary structure, routing operates greedily at two different resolutions. We also present simulation analysis in a variety of settings and show that the paths indeed have small stretch in practice, considerably shorter than the bounds guaranteed by the theory.

【Keywords】: telecommunication network routing; wireless sensor networks; auxiliary structure; bounded stretch geographic homotopic routing; coarse triangulation; greedy routing; lightweight homotopic routing scheme; load balancing; routing resilience; sensor networks; triangle sequence; wireless sensor network; Computers; Conferences; Joining processes; Robot sensing systems; Routing; Spirals

111. Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle.

Paper Link】 【Pages】:988-996

【Authors】: Stefano Basagni ; Ladislau Bölöni ; Petrika Gjanci ; Chiara Petrioli ; Cynthia A. Phillips ; Danila Turgut

【Abstract】: This paper considers underwater wireless sensor networks (UWSNs) for submarine surveillance and monitoring. Nodes produce data with an associated value, decaying in time. An autonomous underwater vehicle (AUV) is sent to retrieve information from the nodes, through optical communication, and periodically emerges to deliver the collected data to a sink, located on the surface or onshore. Our objective is to determine a collection path for the AUV so that the Value of Information (VoI) of the data delivered to the sink is maximized. To this purpose, we first define an Integer Linear Programming (ILP) model for path planning that considers realistic data communication rates, distances, and surfacing constraints. We then define the first heuristic for path finding that is adaptive to the occurrence of new events, relying only on acoustic communication for exchanging short control messages. Our Greedy and Adaptive AUV Path-finding (GAAP) heuristic drives the AUV to collect packets from nodes to maximize the VoI of the delivered data. We compare the VoI of data obtained by running the optimum solution derived by the ILP model to that obtained from running GAAP over UWSNs with realistic and desirable size. In our experiments GAAP consistently delivers more than 80% of the theoretical maximum VoI determined by the ILP model.

【Keywords】: autonomous underwater vehicles; information retrieval; integer programming; linear programming; path planning; underwater acoustic communication; video surveillance; GAAP; ILP; UWSN; Value of Information; VoI; autonomous underwater vehicle; data communication; greedy and adaptive AUV path finding; information retrieval; integer linear programming; optical communication; path planning; sensed information; submarine monitoring; submarine surveillance; underwater wireless sensor networks; Acoustics; Monitoring; Optimized production technology; Path planning; Silicon; Underwater vehicles; Videos

WS1: Wireless security and privacy 1 4

112. SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks.

Paper Link】 【Pages】:997-1005

【Authors】: Jingchao Sun ; Xu Chen ; Jinxue Zhang ; Yanchao Zhang ; Junshan Zhang

【Abstract】: This paper studies secret key establishment between two adjacent mobile nodes, which is crucial for securing emerging device-to-device (D2D) communication. As a promising method, cooperative key generation allows two mobile nodes to select some common neighbors as relays and directly extract a secret key from the wireless channels among them. A challenging issue that has been overlooked is that mobile nodes are often self-interested and reluctant to act as relays without adequate reward in return. We propose SYNERGY, a game-theoretical approach for stimulating cooperative key generation. The underlying idea of SYNERGY is to partition a group of mobile nodes into disjoint coalitions such that the nodes in each coalition fully collaborate on cooperative key generation. We formulate the group partitioning as a coalitional game and design centralized and also distributed protocols for obtaining the core solution to the game. The performance of SYNERGY is evaluated by extensive simulations.

【Keywords】: cooperative communication; game theory; private key cryptography; radio networks; relay networks (telecommunication); telecommunication security; wireless channels; D2D communication; adjacent mobile node; cooperative key generation; device-to-device communication; disjoint coalition; distributed protocol; game-theoretical approach; group partitioning; mobile node partition; relay channel; secret key establishment; secret key extraction; synergy; wireless channel; wireless network; Games; Mobile nodes; Peer-to-peer computing; Relays; Servers; Wireless communication

113. Utility-based cooperative decision in cooperative authentication.

Paper Link】 【Pages】:1006-1014

【Authors】: Yunchuan Guo ; Lihua Yin ; Licai Liu ; Binxing Fang

【Abstract】: In mobile networks, cooperative authentication is an efficient way to recognize false identities and messages. However, an attacker can track the location of cooperative mobile nodes by monitoring their communications. Moreover, mobile nodes consume their own resources when cooperating with other nodes in the process of authentication. These two factors cause selfish mobile nodes not to actively participate in authentication. In this paper, a bargaining-based game for cooperative authentication is proposed to help nodes decide whether to participate in authentication or not, and our strategy guarantees that mobile nodes participating in cooperative authentication can obtain the maximum utility, all at an acceptable cost. We obtain Nash equilibrium in static complete information games. To address the problem of nodes not knowing the utility of other nodes, incomplete information games for cooperative authentication are established. We also develop an algorithm based on incomplete information games to maximize every node's utility. The simulation results demonstrate that our strategy has the ability to guarantee authentication probability and increase the number of successful authentications.

【Keywords】: game theory; mobile ad hoc networks; probability; telecommunication security; MANET; Nash equilibrium; authentication probability; authentication process; cooperative authentication; cooperative mobile nodes; information games; mobile ad hoc network; mobile networks; mobile nodes; utility based cooperative decision; Bismuth; Computers; Conferences; High definition video; Human computer interaction; Cooperative authentication; games; location privacy

114. Security vulnerability and countermeasures of frequency offset correction in 802.11a systems.

Paper Link】 【Pages】:1015-1023

【Authors】: Hanif Rahbari ; Marwan Krunz ; Loukas Lazos

【Abstract】: Frequency offset (FO) is an inherent feature of wireless communications. It results from differences in the operating frequency of different radio oscillators. Failure to compensate for the FO may lead to a decoding failure, particularly in OFDM systems. IEEE 802.11a/g systems use a globally known preamble to deal with this issue. In this paper, we demonstrate how an adversary can exploit the structure and publicity of 802.11a's frame preamble to launch a low-power reactive jamming attack against the FO estimation mechanism. In this attack, the adversary will need to quickly detect a PHY frame and subsequently distort the FO estimation mechanism, irrespective of the channel conditions. By employing a fast frame detection technique, and optimizing the energy and structure of the jamming signal, we show the feasibility of such an attack. Furthermore, we propose some mitigation techniques and evaluate one of them through simulations and USRP testbed experimentation.

【Keywords】: OFDM modulation; jamming; radiofrequency oscillators; software radio; telecommunication security; telecommunication standards; wireless LAN; wireless channels; FO correction; FO estimation mechanism; IEEE 802.11a/g systems; OFDM systems; PHY frame; USRP testbed experimentation; channel conditions; countermeasures; decoding failure; fast frame detection technique; frequency offset correction; jamming signal; low-power reactive jamming attack; radio oscillators; security vulnerability; wireless communications; Channel estimation; Estimation; Jamming; Noise; OFDM; Receivers; Timing

115. A new efficient physical layer OFDM encryption scheme.

Paper Link】 【Pages】:1024-1032

【Authors】: Fei Huo ; Guang Gong

【Abstract】: In this paper, we propose a new encryption scheme for OFDM systems. The reason for physical layer approach is that it has the least impact on the system and is the fastest among all layers. This scheme is computationally secure against the adversary. It requires less key streams compared with other approaches. The idea comes from the importance of orthogonality in OFDM symbols. Destroying the orthogonality create intercarrier interferences. This in turn cause higher bit and symbol decoding error rate. The encryption is performed on the time domain OFDM symbols, which is equivalent to performing nonlinear masking in the frequency domain. Various attacks are explored in this paper. These include known plaintext and ciphertext attack, frequency domain attack, time domain attack, statistical attack and random guessing attack. We show our scheme is resistant against these attacks. Finally, simulations are conducted to compare the new scheme with the conventional cipher encryption.

【Keywords】: OFDM modulation; cryptography; decoding; intercarrier interference; OFDM symbols; OFDM systems; cipher encryption; ciphertext attack; efficient physical layer OFDM encryption scheme; frequency domain; frequency domain attack; intercarrier interferences; nonlinear masking; orthogonality; physical layer approach; plaintext attack; random guessing attack; statistical attack; symbol decoding error rate; time domain OFDM symbols; time domain attack; Ciphers; Encryption; Frequency-domain analysis; OFDM; Receivers; Time-domain analysis

CC5: Cloud computing 5 4

116. Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters.

Paper Link】 【Pages】:1033-1041

【Authors】: Liuhua Chen ; Haiying Shen

【Abstract】: In cloud datacenters, effective resource provisioning is needed to maximize energy efficiency and utilization of cloud resources while guaranteeing the Service Level Agreement (SLA) for tenants. Previous resource provisioning strategies either allocate physical resources to virtual machines (VMs) based on static VM resource demands or dynamically handle the variations in VM resource requirements through live VM migrations. However, the former fail to maximize energy efficiency and resource utilization while the latter produce high migration overhead. To handle these problems, we propose an initial VM allocation mechanism that consolidates complementary VMs with spatial/temporal-awareness. Complementary VMs are the VMs whose total demand of each resource dimension (in the spatial space) nearly reaches their host's capacity during VM lifetime period (in the temporal space). Based on our observation of the existence of VM resource utilization patterns, the mechanism predicts the lifetime resource utilization patterns of short-term VMs or periodical resource utilization patterns of long-term VMs. Based on the predicted patterns, it coordinates the requirements of different resources and consolidates complementary VMs in the same physical machine (PM). This mechanism reduces the number of PMs needed to provide VM service hence increases energy efficiency and resource utilization and also reduces the number of VM migrations and SLA violations. Simulation based on two real traces and real-world testbed experiments show that our initial VM allocation mechanism significantly reduces the number of PMs used, SLA violations and VM migrations of the previous resource provisioning strategies.

【Keywords】: cloud computing; computer centres; contracts; resource allocation; virtual machines; PM; SLA; VM allocation mechanism; VM resource utilization patterns; cloud datacenters; complementary VM consolidation; physical machine; physical resource allocation; resource provisioning; service level agreement; virtual machines; Bandwidth; Computers; Conferences; Google; Radio access networks; Resource management; Virtual machining

117. When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds.

Paper Link】 【Pages】:1042-1050

【Authors】: Shengbo Chen ; Yin Sun ; Ulas C. Kozat ; Longbo Huang ; Prasun Sinha ; Guanfeng Liang ; Xin Liu ; Ness B. Shroff

【Abstract】: Storage clouds, such as Amazon S3, are being widely used for web services and Internet applications. It has been observed that the delay for retrieving data from and placing data into the clouds is quite random, and exhibits weak correlations between different read/write requests. This inspires us to investigate a key problem: can we reduce the delay by transmitting data replications in parallel or using powerful erasure codes? In this paper, we study the problem of reducing the delay of downloading data from cloud storage systems by leveraging multiple parallel threads, assuming that the data has been encoded and stored in the clouds using fixed rate forward error correction (FEC) codes with parameters (n, k). That is., each file is divided into k equal-sized chunks, which are then expanded into n chunks such that any k chunks out of the n are sufficient to successfully restore the original file. The model can be depicted as a multiple-server queue with arrivals of data retrieving requests and a server corresponding to a thread. However, this is not a typical queueing model because a server can terminate its operation, depending on when other servers complete their service (due to the redundancy that is spread across the threads). Hence, to the best of our knowledge, the analysis of this queueing model remains quite uncharted. Real traces from Amazon S3 show that the time to retrieve a fixed size chunk is random and can be accurately approximated as an i.i.d. exponentially distributed random variable. We show that any work-conserving scheme is delay-optimal when k = 1. When k > 1, we find that a simple greedy scheme, which allocates all available threads to the head of line request, is delay optimal, which appears surprising.

【Keywords】: Web services; cloud computing; forward error correction; storage management; Amazon S3; FEC codes; Internet applications; Web services; cloud storage systems; data retrieving requests; downloading data; exponentially distributed random variable; forward error correction codes; greedy scheme; multiple parallel threads; multiple-server queue; optimal-latency data retrieving scheme; parallel data replication transmission; powerful erasure codes; queueing model; read/write requests; work-conserving scheme; Cloud computing; Delays; Encoding; Instruction sets; Redundancy; Resource management; Servers

118. Power consumption of virtual machines with network transactions: Measurement and improvements.

Paper Link】 【Pages】:1051-1059

【Authors】: Ryan Shea ; Haiyang Wang ; Jiangchuan Liu

【Abstract】: There have been significant studies on virtual machines (VMs), including their power consumption in performing different types of tasks. The VM's power consumption with network transactions, however, has seldom been examined. This paper presents an empirical study on the power consumption of typical virtualization packages while performing network tasks. We find that both Hardware Virtualization and Paravirtualization add considerable energy overhead, affecting both sending and receiving, and a busy virtualized web-server may consume 40% more energy than its non-virtualized counterparts. Our detailed profiling on packet path reveals that a VM can take 5 times more cycles to deliver a packet than a bare-metal machine, and is also much less efficient on caching. Without fundamental changes to the hypervisor-based VM architecture, we show that the use of adaptive packet buffering potentially reduces the overhead. Its practicality and effectiveness in power saving are validated through driver-level implementation and experiments.

【Keywords】: power consumption; virtual machines; VM power consumption; adaptive packet buffering; bare-metal machine; caching; energy overhead; hardware virtualization packages; hypervisor-based VM architecture; network transactions; paravirtualization; power saving; virtual machines; virtualized Web server; Hardware; Kernel; Power demand; Power measurement; Virtual machine monitors; Virtual machining; Virtualization

119. Can mobile cloudlets support mobile applications?

Paper Link】 【Pages】:1060-1068

【Authors】: Yujin Li ; Wenye Wang

【Abstract】: A mobile cloudlet is a set of resource-rich mobile devices - referred to as cloudlet nodes - that an initiator mobile device can connect to for services. In this paper, we examine the fundamental mobile cloudlet properties that unfold whether and when a mobile cloudlet can provide mobile application service. Specifically, we investigate the cloudlet size, cloudlet node's lifetime and reachable time. Traces and mathematical analysis demonstrate that 1) the more frequently mobile devices meet, the larger the pool of computing resources an initiator can access; 2) intermittent connection between devices has little adverse effect on the optimal computing performance of mobile cloudlet in the long run; 3) the ratio E(TC)/[E(TI)+E(TC)] indicates the connection likelihood of an initiator and a cloudlet node (i.e., reachability of the cloudlet node), where TC and TI are their contact and inter-contact time. We further derive upper and lower bounds on computing capacity and computing speed of a mobile cloudlet. An initiator can use both bounds to decide whether to offload its task to remote clouds or local mobile cloudlets for better mobile application services.

【Keywords】: cloud computing; mobile computing; cloudlet node lifetime; cloudlet size; computing capacity; computing resources; computing speed; connection likelihood; initiator mobile device; intercontact time; intermittent connection; mobile application service; mobile applications; mobile cloudlet properties; optimal computing performance; reachable time; remote clouds; resource-rich mobile devices; Cloud computing; Computers; Conferences; Mobile communication; Mobile computing; Mobile handsets; Peer-to-peer computing

CN1: Cellular networks 1 4

120. Structured spectrum allocation and user association in heterogeneous cellular networks.

Paper Link】 【Pages】:1069-1077

【Authors】: Wei Bao ; Ben Liang

【Abstract】: We study joint spectrum allocation and user association in heterogeneous cellular networks with multiple tiers of base stations. A stochastic geometric approach is applied as the basis to derive the average downlink user data rate in a closed-form expression. Then, the expression is employed as the objective function in jointly optimizing spectrum allocation and user association, which is of non-convex programming in nature. A computationally efficient Structured Spectrum Allocation and User Association (SSAUA) approach is proposed, solving the optimization problem optimally when the density of users is low, and near-optimally with a guaranteed performance bound when the density of users is high. A Surcharge Pricing Scheme (SPS) is also presented, such that the designed association bias values can be achieved in Nash equilibrium. Simulations and numerical studies are conducted to validate the accuracy and efficiency of the proposed SSAUA approach and SPS.

【Keywords】: cellular radio; concave programming; frequency allocation; geometric programming; stochastic programming; Nash equilibrium; SPS; SSAUA approach; association bias values; average downlink user data rate; closed-form expression; guaranteed performance bound; heterogeneous cellular networks; multiple base stations tiers; nonconvex programming; objective function; optimization problem; stochastic geometric approach; structured spectrum allocation and user association approach; surcharge pricing scheme; Computers; Downlink; Interference; Joints; Optimization; Resource management; Stochastic processes

121. Video delivery over heterogeneous cellular networks: Optimizing cost and performance.

Paper Link】 【Pages】:1078-1086

【Authors】: Konstantinos Poularakis ; George Iosifidis ; Antonios Argyriou ; Leandros Tassiulas

【Abstract】: Video delivery to mobile users is one of the largest challenges that network operators face today. In this work we consider a heterogeneous cellular network with storage capable small-cell base stations, and study this problem for pre-stored video files that can be encoded with two different schemes, namely versions or layers, in various qualities. We introduce a framework for the joint derivation of video caching and routing policies for users with different quality requirements. This allows the operator to optimize a balanced objective of incurred servicing cost, and users experienced delay, according to his priorities. The numerical results indicate that versions and layers may have different impact on the delay and servicing cost, depending on the diversity of users' demand, and that the cost-delay trade off is affected by the network's load.

【Keywords】: cellular radio; telecommunication network routing; cost-delay trade off; heterogeneous cellular networks; mobile users; network load; network operators; pre-stored video files; quality requirements; routing policies; small-cell base stations; user demand; video caching; video delivery; Base stations; Computers; Delays; Encoding; Mobile communication; Routing; Streaming media

122. Cell planning for heterogeneous networks: An approximation algorithm.

Paper Link】 【Pages】:1087-1095

【Authors】: Wentao Zhao ; Shaowei Wang ; Chonggang Wang ; Xiaobing Wu

【Abstract】: Low-power access points, such as pico base stations (BSs), femto BSs, and relays are introduced to the next generation cellular systems to enhance coverage and improve system capacity. Deploying low-power access points to offload the conventional macro BSs is deemed as a spectrum- and cost-efficient way to meet the sharp increase of traffic requirements of cellular networks. However, it also leads to heterogeneous network framework and raises new challenges for cell planning. In this paper, we study the minimum cost cell planning problem in such a heterogeneous network. Our optimization task is to select a subset of candidate sites to lay BSs, including macro BSs, pico BSs and relays, to minimize the total deployment cost while satisfying the rate requirements of the demand nodes (DNs) served by the cellular network. We prove that the general case of the formulated problem is APX-hard, where a DN is constrained to be associated with only one BS. However, if each DN can be served by multiple BSs, which is a reasonable case for practical cellular systems, we show it is not APX-hard and develop an approximation algorithm to work out promising solutions. Our proposed algorithm guarantees an approximation ratio of O(logR) to the global optimum, where R is the maximum achievable capacity of the BSs. Numerical results indicate that our proposal can significantly reduce the deployment cost of the cellular network with given rate requirements of DNs compared to other cell planning schemes.

【Keywords】: approximation theory; computational complexity; cost reduction; femtocellular radio; next generation networks; optimisation; picocellular radio; radio spectrum management; relay networks (telecommunication); telecommunication network planning; telecommunication traffic; APX-hard problem; approximation algorithm; cost-efficient way; coverage enhancement; demand nodes; femto BS; heterogeneous network framework; low-power access points; minimum cost cell planning problem; next generation cellular systems; optimization task; pico base stations; relays; spectrum-efficient way; system capacity improvement; total deployment cost minimization; traffic requirements; Approximation algorithms; Approximation methods; Bandwidth; Manganese; Optimization; Planning; Relays

Paper Link】 【Pages】:1096-1104

【Authors】: Walid Saad ; Zhu Han ; Rong Zheng ; Mérouane Debbah ; H. Vincent Poor

【Abstract】: In this paper, the problem of uplink user association in small cell networks, which involves interactions between users, small cell base stations, and macro-cell stations, having often conflicting objectives, is considered. The problem is formulated as a college admissions game with transfers in which a number of colleges, i.e., small cell and macro-cell stations seek to recruit a number of students, i.e., users. In this game, the users and access points (small cells and macro-cells) rank one another based on preference functions that capture the users' need to optimize their utilities which are functions of packet success rate (PSR) and delay as well as the small cells' incentive to extend the macro-cell coverage (e.g., via cell biasing/range expansion) while maintaining the users' quality-of-service. A distributed algorithm that combines notions from matching theory and coalitional games is proposed to solve the game. The convergence of the algorithm is shown and the properties of the resulting assignments are discussed. Simulation results show that the proposed approach yields a performance improvement, in terms of the average utility per user, reaching up to 23% relative to a conventional, best-PSR algorithm.

【Keywords】: cellular radio; game theory; quality of service; PSR algorithm; QoS; cell base stations; cell biasing-range expansion; coalitional games; college admissions game; distributed algorithm; macrocell stations; matching theory; packet success rate; preference functions; quality-of-service; uplink user association; wireless small cell networks; Computers; Delays; Educational institutions; Games; Quality of service; Uplink; Wireless communication

EE2: Energy efficiency in wireless networks 2 4

124. Safe Charging for wireless power transfer.

Paper Link】 【Pages】:1105-1113

【Authors】: Haipeng Dai ; Yunhuai Liu ; Guihai Chen ; Xiaobing Wu ; Tian He

【Abstract】: As battery-powered mobile devices become more popular and energy hungry, wireless power transfer technology receives intensive interests, as it allows the power to be transferred from a charger to ambient devices wirelessly. The existing studies mainly focus on the power transfer efficiency but overlook the health impairments caused by RF exposure. In this paper, we study the Safe Charging Problem (SCP) of scheduling power chargers so that more energy can be received while no location in the field has electromagnetic radiation (EMR) exceeding a given threshold Rt. We prove that SCP is NP-hard and propose a solution which provably outperforms the optimal solution to SCP with a relaxed EMR threshold (1 - ε)Rt. Testbed results based on 8 Powercast TX91501 chargers validate our results. Extensive simulation results show that the gap between our solution and the optimal one is only 6.7% when ε = 0.1, while a naive greedy algorithm is 34.6% below our solution.

【Keywords】: battery chargers; biological effects of radiation; electromagnetic waves; greedy algorithms; mobile radio; optimisation; radiofrequency power transmission; EMR threshold; NP-hard; Powercast TX91501 chargers; RF exposure; SCP; battery-powered mobile devices; electromagnetic radiation; greedy algorithm; power chargers; safe charging problem; wireless power transfer technology; Approximation algorithms; Approximation methods; Conferences; Piecewise linear approximation; Radio frequency; Safety; Wireless communication

125. Energy-efficient cooperative broadcast in fading wireless networks.

Paper Link】 【Pages】:1114-1122

【Authors】: Chenxi Qiu ; Haiying Shen ; Lei Yu

【Abstract】: Cooperative broadcast, in which receivers are allowed to combine received packet from different senders to combat transmission errors, has gained increasing attention. Previous studies showed that broadcast optimization solutions are sufficient in non-fading environments but may suffer a low delivery ratio under wireless channel fading. Though previous work analyzed the tradeoff between energy and delay in cooperative broadcast, no works investigated the tradeoff in a fading environment. Thus, in this paper, we study this tradeoff with the consideration of fading. We formulate this problem as a Fading-resistant Delay-constrained Minimum Energy Cooperative Broadcast (FDMECB) problem, and prove that it is NP-complete. We then propose an approximation algorithm for theoretical interests. We further propose a heuristic algorithm that makes approximately optimal local decision to achieve global optimization. Our experimental results show that our algorithms outperform a previous non-fading resistant algorithm.

【Keywords】: computational complexity; cooperative communication; fading channels; optimisation; radio networks; FDMECB problem; NP-complete; approximation algorithm; broadcast optimization solutions; energy-efficient cooperative broadcast; fading wireless networks; fading-resistant delay-constrained minimum energy cooperative broadcast problem; global optimization; heuristic algorithm; nonfading resistant algorithm; optimal local decision; wireless channel fading; Approximation algorithms; Approximation methods; Delays; Fading; Receivers; Relays; Schedules

126. Performance-aware energy optimization on mobile devices in cellular network.

Paper Link】 【Pages】:1123-1131

【Authors】: Yong Cui ; Shihan Xiao ; Xin Wang ; Minming Li ; Hongyi Wang ; Zeqi Lai

【Abstract】: In cellular networks, it is important to conserve energy while at the same time ensuring users to have good transmission experiences. The energy cost can result from tail energy due to the radio resource control strategies designed in cellular networks and data transmission. Existing efforts generally consider one of the energy issues, and also ignore the adverse impact on user transmission performance due to energy conservation. In addition, many existing algorithms are based on prediction and knowledge on future traffic, which are hard to apply in a practical wireless system with dynamic user traffic and channel condition. The goal of this work is to design an efficient online scheduling algorithm to minimize energy consumption both due to tail energy and transmissions while meeting user performance expectation. We prove the problem to be NP-hard, and design a practical online scheduling algorithm PerES to minimize the total energy cost of multiple mobile applications subject to user performance constraints. We propose a comprehensive performance cost metric to capture the impacts due to task delay, deadline violation, different application profiles and user preferences. We prove that our proposed scheduling algorithm can make the energy consumption arbitrarily close to that of the optimal scheduling solution. The evaluation results demonstrate the effectiveness of our scheme and its higher performance than peers. Moreover, by supporting dynamic performance requirement by mobile users, PerES can achieve 2 times faster convergence to both the performance degradation bound and optimal energy conversation bound than those of traditional static methods. Using 821 million traffic flows collected from a commercial cellular carrier, we verify our scheme could achieve on average 32%-56% energy savings with different levels of user experience.

【Keywords】: cellular radio; mobile radio; scheduling; NP-hard problem; cellular carrier; cellular network; data transmission; energy conservation; mobile devices; optimal scheduling; performance aware energy optimization; radio resource control strategies; tail energy; wireless system; Data communication; Delays; Energy consumption; Mobile communication; Optimization; Resource management; Wireless communication

127. Microeconomic analysis of base-station sharing in green cellular networks.

Paper Link】 【Pages】:1132-1140

【Authors】: Bingjie Leng ; Parisa Mansourifard ; Bhaskar Krishnamachari

【Abstract】: Cellular networks can be operated more energy-efficiently if operators agree to share base-stations during off-peak hours. We apply a micro-economic analysis for a single-cell two-operator scenario to investigate the conditions under which self-interested operators would agree to share resources in this manner. Our analysis yields a comprehensive treatment of the existence and number of Nash Equilibria. We consider the cases when the payment rates are exogenous, as well as when they can be set strategically by the operators. Through numerical solutions we examine the quality of the best and worst Nash Equilibria in comparison with the globally optimized solution. Our results show that there is often a sensitive dependence on key parameters such as energy price, capacity, load, revenues, penalties and payments.

【Keywords】: game theory; microeconomics; mobile radio; telecommunication power management; Nash equilibria quality; base station sharing microeconomic analysis; green cellular network; resource sharing; self-interested operator; single cell two operator scenario; Base stations; Computers; Conferences; Educational institutions; Games; Green products; Turning

IM3: Internet monitoring and measurement 3 4

128. Optimal collaborative access point association in wireless networks.

Paper Link】 【Pages】:1141-1149

【Authors】: Ouldooz Baghban Karimi ; Jiangchuan Liu ; Jennifer Rexford

【Abstract】: The popularity of wireless local area networks has led to a dramatic increase in the density of access points, especially in urban areas. These access points are individually owned, placed, and power-tuned for their local users and are generally oblivious to others. On the other hand, the abundance of access points that mostly share the same upstream provider, offers opportunities for optimization of association to mitigate the negative impact of the overlapped coverage. We use this opportunity to enable collaboration by using a share of each access point's bandwidth to serve non-local users and gain access to their bandwidth in return. We extend the conventional proportional fair association through sharing and collaboration among individual networks, and present centrally optimized solutions. Our performance evaluation, based on data traces collected in 100 residential locations, demonstrate the superiority of our solution, outperforming the throughput of non-collaborative optimal access by up to 140%.

【Keywords】: multi-access systems; optimisation; wireless LAN; access points; data traces; noncollaborative optimal access; nonlocal users; optimal collaborative access point association; optimization; overlapped coverage; residential locations; upstream provider; wireless local area networks; Bandwidth; Collaboration; Optimization; Throughput; Wireless networks; Wireless sensor networks

129. kBF: A Bloom Filter for key-value storage with an application on approximate state machines.

Paper Link】 【Pages】:1150-1158

【Authors】: Sisi Xiong ; Yanjun Yao ; Qing Cao ; Tian He

【Abstract】: Key-value (k-v) storage has been used as a crucial component for many network applications, such as social networks, online retailing, and cloud computing. Such storage usually provides support for operations on key-value pairs, and can be stored in memory to speed up responses to queries. So far, existing methods have been deterministic: they will faithfully return previously inserted key-value pairs. Providing such accuracy, however, comes at the cost of memory and CPU time. In contrast, in this paper, we present an approximate k-v storage that is more compact than existing methods. The tradeoff is that it may, theoretically, return a null value for a valid key with a low probability, or return a valid value for a key that was never inserted. Its design is based on the probabilistic data structure called the “Bloom Filter”, which was originally developed to test element membership in sets. In this paper, we extend the bloom filter concept to support key-value operations, and demonstrate that it still retains the compact nature of the original bloom filter. We call the resulting design as the kBF (key-value bloom filter), and systematically analyze its performance advantages and design tradeoffs. Finally, we apply the kBF to a practical problem of implementing a state machine in network intrusion detection to demonstrate how the kBF can be used as a building block for more complicated software infrastructures.

【Keywords】: computer network security; data structures; finite state machines; probability; Bloom filter; approximate k-v storage; approximate state machines; element membership test; kBF; key-value operations; key-value pairs; key-value storage; network intrusion detection; probabilistic data structure; software infrastructures; Compaction; Computers; Conferences; Data structures; Decoding; Encoding; Radiation detectors

130. Detecting malicious HTTP redirections using trees of user browsing activity.

Paper Link】 【Pages】:1159-1167

【Authors】: Hesham Mekky ; Ruben Torres ; Zhi-Li Zhang ; Sabyasachi Saha ; Antonio Nucci

【Abstract】: The web has become a platform that attackers exploit to infect vulnerable hosts, or deceive victims into buying rogue software. To accomplish this, attackers either inject malicious scripts into popular web sites or manipulate content delivered by servers to exploit vulnerabilities in users' browsers. To hide malware distribution servers, attackers employ HTTP redirections, which automatically redirect users' requests through a series of intermediate web sites, before landing on the final distribution site. In this paper, we develop a methodology to identify malicious chains of HTTP redirections. We build per-user chains from passively collected traffic and extract novel statistical features from them, which capture inherent characteristics from malicious redirection cases. Then, we apply a supervised decision tree classifier to identify malicious chains. Using a large ISP dataset, with more than 15K clients, we demonstrate that our methodology is very effective in accurately identifying malicious chains, with recall and precision values over 90% and up to 98%.

【Keywords】: Internet; Web sites; invasive software; trees (mathematics); World Wide Web; intermediate Web sites; large ISP dataset; malicious HTTP redirections; malicious chains; malicious redirection; malware distribution servers; rogue software; supervised decision tree classifier; user browsers; user browsing activity; Browsers; Feature extraction; Malware; Search engines; Servers; Software; Web sites

131. What scale of audience a campaign can reach in what price on Twitter?

Paper Link】 【Pages】:1168-1176

【Authors】: Yubao Zhang ; Xin Ruan ; Haining Wang ; Hui Wang

【Abstract】: Campaigns with commercial and spam purposes have flooded the Twitter community. To understand what scale of audience a campaign could reach, we first perform a measurement study by collecting a dataset of about 10 million tweets via streaming API and one million search tweets for targeting topics, as well as 37,313 user accounts that are suspended by Twitter. From the dataset, we extract a spam campaign and a commercial promotion campaign accompanied by spamming activities. Then, we characterize the way in which a campaign can reach its audience, especially revealing the features that dominate the information diffusion. After identifying the accounts suspended by Twitter, we further inspect to what extent these features can help to weed out spam accounts. Also, the retrospective inspection is useful to uncover the tactics that malicious accounts utilize to avoid being suspended. Using the measurement results, we then develop a theoretical framework based on an epidemic model to investigate the dynamics of spammers and victims whom spammers reach in the spam campaign. With the theoretical framework, we conduct a benefit-cost analysis of the spam campaign, shedding lights on how to restrict the benefit of the spam campaign.

【Keywords】: application program interfaces; cost-benefit analysis; social networking (online); unsolicited e-mail; Twitter; benefit-cost analysis; campaign; commercial promotion campaign; epidemic model; information diffusion; spam accounts; spam campaign; spammer dynamics; spamming activities; streaming API; tweets; Computers; Conferences; Feature extraction; Games; Time factors; Twitter

SN3: Sensor networks 3 4

Paper Link】 【Pages】:1177-1185

【Authors】: Andreas Loukas ; Marco Zuniga ; Ioannis Protonotarios ; Jie Gao

【Abstract】: The decentralized detection of event regions is a fundamental building block for monitoring and reasoning about spatial phenomena. However, so far the problem has been studied almost exclusively for static networks. This study proposes a theoretical framework with which we can analyze event detection algorithms suitable for large-scale mobile networks. Our analysis builds on the following insight: the inherent trends of spatial events are well captured by the spectral domain of the network graph. Using this framework, we propose novel local algorithms that are location-free; that work with mobile nodes and dynamic events; that operate on 3D topologies; and that are simple to implement. We are not aware of event detection algorithms possessing all these traits. Simulations based on complex oil spill traces showcase the resilience and robustness of our methods. Additionally, we demonstrate their validity for practical scenarios by evaluating them on a 105 node testbed.

【Keywords】: mobile computing; signal detection; 3D topologies; decentralized detection; event region detection algorithm; large-scale mobile networks; network graph; novel local algorithms; spatial events; static networks; Eigenvalues and eigenfunctions; Heating; Heuristic algorithms; Kernel; Laplace equations; Noise; Topology

133. Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks.

Paper Link】 【Pages】:1186-1194

【Authors】: Jiliang Wang ; Zhichao Cao ; XuFei Mao ; Yunhao Liu

【Abstract】: Duty cycling mode is widely adopted in wireless sensor networks to save energy. Existing duty-cycling protocols cannot well adapt to different data rates and dynamics, resulting in a high energy consumption in real networks. Improving those protocols may require global information or heavy computation and thus may not be practical, leading to empirical parameters in real protocols. To fill the gap between the application requirement and protocol performance, we design a light-weight adaptive duty-cycling protocol (LAD), which reduces the energy consumption under different data rates and protocol dynamics. We theoretically validate the performance improvement of the protocol. We implement the protocol in TinyOS and extensively evaluate it on 40 TelosB nodes. The evaluation results show the energy consumption can be reduced by 28.2%~40.1% compared with state-of-the-art protocols. Results based on data from a 1200-node operational network further show the effectiveness and scalability of the design.

【Keywords】: protocols; telecommunication power management; wireless sensor networks; LAD; TelosB nodes; TinyOS; duty cycling mode; energy consumption reduction; insomnia therapy; lightweight adaptive duty cycling protocol; protocol dynamics; wireless sensor networks; Conferences; Energy consumption; Protocols; Receivers; Sensors; Switching circuits; Wireless sensor networks

134. Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks.

Paper Link】 【Pages】:1195-1203

【Authors】: Liang He ; Peng Cheng ; Yu Gu ; Jianping Pan ; Ting Zhu ; Cong Liu

【Abstract】: Recently, much research effort has been devoted to employing mobile chargers for energy replenishment of the robots in robotic sensor networks. Observing the discrepancy between the charging latency of robots and charger travel distance, we propose a novel tree-based charging schedule for the charger, which minimizes its travel distance without causing the robot energy depletion. We analytically evaluate its performance and show its closeness to the optimal solutions. Furthermore, through a queue-based approach, we provide theoretical guidance on the setting of the remaining energy threshold at which the robots request energy replenishment. This guided setting guarantees the feasibility of the tree-based schedule to return a depletion-free charging schedule. The performance of the tree-based charging schedule is evaluated through extensive simulations. The results show that the charger travel distance can be reduced by around 20%, when compared with the schedule that only considers the robot charging latency.

【Keywords】: distributed sensors; mobile robots; queueing theory; scheduling; charger travel distance; depletion-free charging schedule; energy threshold; mission-critical robotic sensor networks; mobile chargers; mobile-to-mobile energy replenishment; queue-based approach; robot energy depletion; tree-based charging schedule; Mission critical systems; Mobile communication; Robot kinematics; Robot sensing systems; Schedules; Trajectory

135. Connected wireless camera network deployment with visibility coverage.

Paper Link】 【Pages】:1204-1212

【Authors】: Hua Huang ; Chien-Chun Ni ; Xiaomeng Ban ; Jie Gao ; Andrew T. Schneider ; Shan Lin

【Abstract】: We consider the problem of deployment of cameras inside a complex indoor setting for surveillance applications. We formulate the problem of the minimum guarding network that places a minimum number of cameras satisfying both visual coverage of the domain and wireless network connectivity. We prove that finding the minimum guarding network in both the geometric setting and discrete setting is NP-hard. We also give a 2-approximation algorithm to the geometric minimum guarding network. Motivated by the connection of this problem with the watchman tour problem and the art gallery problem, we develop two algorithms that generate satisfactory results in a prototype testbed and in our simulations.

【Keywords】: approximation theory; cameras; computational complexity; optimisation; sensor placement; video surveillance; wireless sensor networks; 2-approximation algorithm; NP-hard discrete setting; NP-hard geometric setting; art gallery problem; connected wireless camera network deployment; geometric minimum guarding network; surveillance application; visibility coverage; watchman tour problem; Art; Buildings; Cameras; Computers; Relays; Wireless communication; Wireless sensor networks; Camera Networks; Visibility Coverage; Wireless Connectivity

US: Urban sensing and environmental monitoring 4

136. How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint.

Paper Link】 【Pages】:1213-1221

【Authors】: Dong Zhao ; Xiang-Yang Li ; Huadong Ma

【Abstract】: Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori. On the contrary, we focus on a more realistic scenario where users arrive one by one online in a random order. Based on the online auction model, we investigate the problem that users submit their private types to the crowdsourcer when arrive, and the crowdsourcer aims at selecting a subset of users before a specified deadline for maximizing the value of services (assumed to be a non-negative monotone submodular function) provided by selected users under a budget constraint. We design two online mechanisms, OMZ and OMG, satisfying the computational efficiency, individual rationality, budget feasibility, truthfulness, consumer sovereignty and constant competitiveness under the zero arrival-departure interval case and a more general case, respectively. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our online mechanisms.

【Keywords】: incentive schemes; mobile computing; smart phones; trusted computing; MCS; OMG; OMZ; budget constraint; budget feasibility; computational efficiency; constant competitiveness; consumer sovereignty; individual rationality; mobile crowdsourced sensing; offline scenario; online auction model; online incentive mechanisms; online mechanisms; pervasive smartphones; random order; service quality; task crowdsourcing; truthfulness; user participation; zero arrival-departure interval case; Complexity theory; Computers; Conferences; Mechanical factors; Resource management; Sensors; Smart phones

137. Compressive sensing over strongly connected digraph and its application in traffic monitoring.

Paper Link】 【Pages】:1222-1230

【Authors】: Xiao Qi ; Yongcai Wang ; Yuexuan Wang ; Liwen Xu

【Abstract】: Compressive sensing over graphs has recently attracted great research attentions, which takes limited number end-to-end measurements along paths (walks) to recover sparse vectors representing link/node properties. Unlike traditional compressive sensing, the along-path measurements rule out the freedom of random sampling, which introduces path constraints to the measurement matrix. The constraint makes explicit analysis of recovery performance difficult Only for undirected graphs, early results showed that O(klog(n)) end-to-end measurements taken by random walks are sufficient to recover k-sparse edge vector. However, the problem becomes more difficult when directed graphs are considered, because of the easy state absorbing and the difficulty of evaluating the stationary distribution. But digraphs inherently model many network systems. In this paper, particularly for strongly connected digraphs with low node degrees, we presents bounds for the stationary distribution of random walks, and present deliberative proofs which put forward that O(klog(n)) path measurements are sufficient to recover k-sparse edge vectors. Further more, because urban road networks are exactly strongly connected, low degree digraphs, we designed efficient recovery methods to estimate road delays by a small number of probing cars. Although the road delay vector is actually not sparse, we leverage the empirical non-congested road delays as references and develop an algorithm which divide the problem to iteratively recover several k-sparse vectors. Simulation results show that when less than 10% edges are congested, more than 90% congestion states can be recovered correctly by 10% measurements.

【Keywords】: compressed sensing; delay estimation; directed graphs; matrix algebra; road traffic; signal sampling; traffic engineering computing; vectors; along-path measurement rule; compressive sensing; empirical noncongested road delays; end-to-end measurements; k-sparse edge vector recovery; link-node property; low degree digraphs; measurement matrix; network systems; path constraints; probing cars; random sampling; random walks; road delay estimation; road delay vector; sparse vectors; stationary distribution; strongly connected digraph; traffic monitoring; undirected graphs; urban road networks; Compressed sensing; Delays; Monitoring; Roads; Sparse matrices; Vectors

138. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing.

Paper Link】 【Pages】:1231-1239

【Authors】: Zhenni Feng ; Yanmin Zhu ; Qian Zhang ; Lionel M. Ni ; Athanasios V. Vasilakos

【Abstract】: In this paper, we tackle the problem of stimulating smartphone users to join mobile crowdsourcing applications with smartphones. Different from existing work of mechanism design, we uniquely take into consideration the crucial dimension of location information when assigning sensing tasks to smartphones. However, the location awareness largely increases the theoretical and computational complexity. In this paper, we introduce a reverse auction framework to model the interactions between the platform and the smartphones. We rigorously prove that optimally determining the winning bids is NP hard. In this paper we design a mechanism called TRAC which consists of two main components. The first component is a near-optimal approximate algorithm for determining the winning bids with polynomial-time computation complexity, which approximates the optimal solution within a factor of 1 + ln(n), where n is the maximum number of sensing tasks that a smartphone can accommodate. The second component is a critical payment scheme which, despite the approximation of determining winning bids, guarantees that submitted bids of smartphones reflect their real costs of performing sensing tasks. Through both rigid theoretical analysis and extensive simulations, we demonstrate that the proposed mechanism achieves truthfulness, individual rationality and high computation efficiency.

【Keywords】: computational complexity; mobile computing; polynomial approximation; smart phones; NP hard; TRAC; critical payment scheme; location awareness; location information; location-aware collaborative sensing; mobile crowdsourcing applications; near-optimal approximate algorithm; polynomial-time computation complexity; reverse auction framework; rigid theoretical analysis; sensing tasks; smartphone users; submitted bids; truthful auction; winning bids; Algorithm design and analysis; Approximation algorithms; Approximation methods; Collaboration; Crowdsourcing; Mobile communication; Sensors

139. ShopProfiler: Profiling shops with crowdsourcing data.

Paper Link】 【Pages】:1240-1248

【Authors】: Xiaonan Guo ; Eddie C. L. Chan ; Ce Liu ; Kaishun Wu ; Siyuan Liu ; Lionel M. Ni

【Abstract】: Sensing data from mobile phones provide us exciting and profitable applications. Recent research focuses on sensing indoor environment, but suffers from inaccuracy because of the limited reachability of human traces or requires human intervention to perform sophisticated tasks. In this paper, we present ShopProfiler, a shop profiling system on crowdsourcing data. First, we extract customer movement patterns from traces. Second, we improve accuracy of building floor plan by adopting a gradient-based approach and then localize shops through WiFi heat map. Third, we categorize shops by designing an SVM classifier in shop space to support multi-label classification. Finally, we infer brand name from SSID by applying string similarity measurement. Based on over five thousand traces in three big malls in two different countries, we conclude that ShopProfiler achieves better accuracy in building refined floor plan, and characterizes shops in terms of location, category and name with little human intervention.

【Keywords】: gradient methods; marketing; mobile computing; pattern classification; support vector machines; wireless LAN; SSID; SVM classifier; ShopProfiler; WiFi heat map; brand name; building refined floor plan; crowdsourcing data; customer movement patterns; gradient-based approach; human intervention; human traces; indoor environment sensing; mobile phones; multilabel classification; profitable applications; sensing data; shop profiling system; shop space; string similarity measurement; IEEE 802.11 Standards; Legged locomotion; Mobile handsets; Radiation detectors; Sociology; Statistics

WS2: Wireless security and privacy 2 4

140. PS-TRUST: Provably secure solution for truthful double spectrum auctions.

Paper Link】 【Pages】:1249-1257

【Authors】: Zhili Chen ; Liusheng Huang ; Lu Li ; Wei Yang ; Haibo Miao ; Miaomiao Tian ; Fei Wang

【Abstract】: Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besides maintaining the properties of truthfulness and special spectrum reuse of TRUST, PS-TRUST achieves provable security against semi-honest adversaries in the sense of cryptography. Specifically, PS-TRUST reveals nothing about the bids to anyone in the auction, except the auction result. To the best of our knowledge, PS-TRUST is the first provably secure solution for spectrum auctions. Furthermore, experimental results show that the computation and communication overhead of PS-TRUST is modest, and its practical applications are feasible.

【Keywords】: data privacy; radio spectrum management; telecommunication security; PS-TRUST; TRUST spectrum reuse; communication overhead; privacy disclosure; provably secure solution for truthful double spectrum auctions; semihonest adversary; Algorithm design and analysis; Cost accounting; Cryptography; Privacy; Protocols; Zinc

141. Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.

Paper Link】 【Pages】:1258-1266

【Authors】: Pengfei Hu ; Kai Xing ; Xiuzhen Cheng ; Hao Wei ; Haojin Zhu

【Abstract】: Compressive sensing (CS) has been viewed as a promising technology to greatly improve the communication efficiency of data gathering in wireless sensor networks. However, this new data collection paradigm may bring in new threats but few study has paid attention to prevent information leakage during compressive data gathering. In this paper, we identify two statistical inference attacks and demonstrate that traditional compressive data gathering may suffer from serious information leakage under these attacks. In our theoretical analysis, we quantitatively analyze the estimation error of compressive data gathering through extensive statistical analysis, based on which we propose a new secure compressive data aggregation scheme by adaptively changing the measurement coefficients at each sensor and correspondingly at the sink without the need of time synchronization. In our analysis, we show that the proposed scheme could significantly improve data confidentiality at light computational and communication overhead.

【Keywords】: compressed sensing; data acquisition; data protection; statistical analysis; telecommunication security; wireless sensor networks; compressive data gathering; compressive sensing; countermeasure; data collection; estimation error analyze; information leakage prevention; measurement coefficients; secure compressive data aggregation scheme; statistical analysis; statistical inference attack identification; wireless sensor network; Compressed sensing; Conferences; Cryptography; Matching pursuit algorithms; Vectors; Wireless sensor networks

142. Secure cooperative spectrum sensing and access against intelligent malicious behaviors.

Paper Link】 【Pages】:1267-1275

【Authors】: Wei Wang ; Lin Chen ; Kang G. Shin ; Lingjie Duan

【Abstract】: Sensing falsification is a key security problem in cooperative spectrum sensing for cognitive radio networks. Most previous approaches assume that malicious users only cheat in their sensing reports following a predefined rule. However, some malicious users usually act intelligently to strategically adjust their malicious behavior according to their objectives and the network's defense schemes. The existing schemes cannot resist the malicious behaviors of intelligent malicious users (IMUs) without long-term collection of information on their reputation. In this paper, we construct a moral hazard principal-agent framework and design an incentive compatible mechanism to thwart the malicious behaviors of rational and irrational IMUs. We find that neither spectrum sensing nor spectrum access alone can prevent the malicious behavior without any information on users' reputation. According to the analysis of malicious behavior resistance methods, we propose a joint spectrum sensing and access mechanism to optimally prevent the IMUs from sensing falsification. Our evaluation results show that the proposed mechanism achieves almost the same performance as the ideal case with perfect sensing.

【Keywords】: cognitive radio; radio spectrum management; signal detection; telecommunication security; IMU; cognitive radio networks; incentive compatible mechanism; intelligent malicious behaviors; intelligent malicious users; malicious users; network defense; principal agent framework; secure cooperative spectrum access; secure cooperative spectrum sensing; security problem; sensing falsification; Computers; Conferences; Ethics; Hazards; Joints; Resistance; Sensors

143. Physical layer challenge-response authentication in wireless networks with relay.

Paper Link】 【Pages】:1276-1284

【Authors】: Xianru Du ; Dan Shan ; Kai Zeng ; Lauren M. Huie

【Abstract】: Exploiting physical layer characteristics to enhance or complement authentication strength in wireless networks has been attracting research attention recently. Existing physical layer authentication mechanisms mainly tackle single-hop communications. In this paper, we propose two physical layer challenge-response authentication mechanisms for wireless networks with relay. One mechanism, named PHY-CRAMR, is an extension of the existing PHY-CRAM protocol. It fully utilizes the randomness, reciprocity, and location decorrelation features of the wireless fading channel to hide/encrypt the challenge response messages at the physical layer, and is immune to outside attacks with a trusted relay. The other novel mechanism, named PHY-AUR, exploits randomness, coherence, and location decorrelation properties of wireless fading channel to securely convey the product of the channel state information on consecutive links and uses the fading channel to encrypt challenge and response messages. PHY-AUR is immune to both outside and inside attacks with an untrusted relay. Both PHY-CRAMR and PHY-AUR adopt OFDM technique to modulate the authentication key and challenge-response messages on subcarriers. Physical layer pilots and preambles are eliminated to prevent an attacker from gaining knowledge about the channel state information, and as a result prevent the authentication key from being revealed to untrusted attackers. We analyze the security strength of both mechanisms and conduct extensive simulations to evaluate them. It shows that both PHY-CRAMR and PHY-AUR can achieve both a high successful authentication rate and low false acceptance rate, and the performance improves as the signal to noise ratio (SNR) increases.

【Keywords】: OFDM modulation; cryptographic protocols; fading channels; message authentication; radio networks; relay networks (telecommunication); telecommunication security; OFDM technique; PHY-AUR; PHY-CRAM protocol; SNR; channel state information; consecutive links; high successful authentication rate; inside attacks; location decorrelation features; low false acceptance rate; outside attacks; physical layer challenge-response authentication mechanism; physical-layer security; preambles; response messages; signal to noise ratio; single-hop communications; trusted relay; wireless fading channel; wireless networks; Authentication; Communication system security; OFDM; Physical layer; Protocols; Relays; Wireless communication; OFDM; Physical-layer security; challenge-response authentication; relay network; wireless fading channel

CC6: Clound computing 6 4

144. A deep investigation into network performance in virtual machine based cloud environments.

Paper Link】 【Pages】:1285-1293

【Authors】: Ryan Shea ; Feng Wang ; Haiyang Wang ; Jiangchuan Liu

【Abstract】: Existing research on cloud network (in)stability has primarily focused on communications between Virtual Machines (VMs) inside a cloud, leaving that of VM communications over higher-latency wide-area networks largely unexplored. Through measurement in real-world cloud platforms, we find that there are prevalent and significant degradation and variation for such VM communications with both TCP and UDP traffic, even over lightly utilized networks. Our in-depth measurement and detailed system analysis reveal that the performance variation and degradation are mainly due to the dual-role of the CPU in both computation and network communication in a VM, and they can be dramatically affected by the CPU's scheduling policy. We provide strong evidence that such issues can be addressed in the hypervisor level and present concrete solutions. Such remedies have been implemented and evaluated in our cloud testbed, showing noticeable improvement for long-haul network communications with VMs.

【Keywords】: cloud computing; scheduling; transport protocols; virtual machines; CPU scheduling policy; TCP traffic; UDP traffic; VM; VM communications; cloud network stability; higher-latency wide-area networks; network performance; transport control protocol; user defined protocol; virtual machine based cloud environment; Bandwidth; Benchmark testing; Cloud computing; Computers; Degradation; Throughput; Virtual machining

145. RIAL: Resource Intensity Aware Load balancing in clouds.

Paper Link】 【Pages】:1294-1302

【Authors】: Liuhua Chen ; Haiying Shen ; Karan Sapra

【Abstract】: To provide robust infrastructure as a service (IaaS), clouds currently perform load balancing by migrating virtual machines (VMs) from heavily loaded physical machines (PMs) to lightly loaded PMs. The unique features of clouds pose formidable challenges to achieving effective and efficient load balancing. First, VMs in clouds use different resources (e.g., CPU, bandwidth, memory) to serve a variety of services (e.g., high performance computing, web services, file services), resulting in different overutilized resources in different PMs. Also, the overutilized resources in a PM may vary over time due to the time-varying heterogenous service requests. Second, there is intensive network communication between VMs. However, previous load balancing methods statically assign equal or predefined weights to different resources, which leads to degraded performance in terms of speed and cost to achieve load balance. Also, they do not strive to minimize the VM communications between PMs. We propose a Resource Intensity Aware Load balancing method (RIAL). For each PM, RIAL dynamically assigns different weights to different resources according to their usage intensity in the PM, which significantly reduces the time and cost to achieve load balance and avoids future load imbalance. It also tries to keep frequently communicating VMs in the same PM to reduce bandwidth cost, and migrate VMs to PMs with minimum VM performance degradation. Our extensive trace-driven simulation results and real-world experimental results show the superior performance of RIAL compared to other load balancing methods.

【Keywords】: cloud computing; cost reduction; digital simulation; resource allocation; virtual machines; IaaS; PM; RIAL; VM communications; bandwidth cost reduction; clouds; heavily loaded physical machines; load imbalance; overutilized resources; resource intensity aware load balancing; robust infrastructure as a service; time-varying heterogenous service requests; trace-driven simulation; virtual machines; Bandwidth; Computers; Convergence; Degradation; Load management; Resource management; Servers

146. Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems.

Paper Link】 【Pages】:1303-1311

【Authors】: Jian-Jhih Kuo ; Hsiu-Hsien Yang ; Ming-Jer Tsai

【Abstract】: The MapReduce/Hadoop architecture has become very important and effective in cloud systems because many data-intensive applications are usually required to process big data. In such environments, big data is partitioned and stored over several data nodes; thus, the total completion time of a task would be delayed if the maximum access latency among all pairs of a data node and its assigned computation node is not bounded. Moreover, the computation nodes usually need to communicate with each other for aggregating the computation results; therefore, the maximum access latency among all pairs of assigned computation nodes also needs to be bounded. In the literature, it has been proved that the placement problem of computation nodes (virtual machines) to minimize the maximum access latency among all pairs of a data node and its assigned computation node and among all pairs of assigned computation nodes does not admit any approximation algorithm with a factor smaller than two, whereas no approximation algorithms have been proposed so far. In this paper, we first propose a 3-approximation algorithm for resolving the problem. Subsequently, we close the gap by proposing a 2-approximation algorithm, that is, an optimal approximation algorithm, for resolving the problem in the price of higher time complexity. Finally, we conduct simulations for evaluating the performance of our algorithms.

【Keywords】: Big Data; approximation theory; cloud computing; computational complexity; minimisation; virtual machines; 2-approximation algorithm; 3-approximation algorithm; Big Data processing; MapReduce-Hadoop architecture; cloud systems; computation node placement problem; data access latency; data latency minimization; data node; data-intensive applications; maximum access latency minimization; optimal approximation algorithm; time complexity; virtual machine placement; Approximation algorithms; Approximation methods; Big data; Bipartite graph; Conferences; Three-dimensional displays; Virtual machining

147. Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances.

Paper Link】 【Pages】:1312-1320

【Authors】: Pablo Jesús Argibay-Losada ; Kseniia Nozhnina ; Gokhan Sahin ; Chunming Qiao

【Abstract】: Due to lack of optical RAM buffers in fast optical switches (FOS), statistical multiplexing technologies using FOS like Optical Burst Switching (OBS) or Optical Packet Switching (OPS) are expected to have higher data losses than conventional electronic networks. Consequently, applications transferring data by means of TCP can suffer from a lower throughput. In this paper, we show that this low-throughput problem is mainly an artifact caused by the conventional TCP congestion control algorithms, and can be remedied by using a simple yet effective stop-and-wait congestion control algorithm instead, as long as the propagation delay between TCP source and TCP destination is small compared to the transmission time of an optical packet. We show that such a condition holds for a wide range of scenarios, including fat-tree-based data center networks. We also show that the throughput achieved in a FOS network using stop-and-wait can be the same as, or higher than that in an equivalent, conventional electronic network.

【Keywords】: optical burst switching; optical switches; packet switching; statistical multiplexing; trees (mathematics); FOS; OBS; OPS; TCP congestion control algorithms; TCP throughput; effective stop-and-wait congestion control algorithm; fast optical switching networks; fat-tree-based data center networks; low-throughput problem; optical RAM buffers; optical burst switching; optical packet switching; propagation delay; statistical multiplexing technologies; Optical buffering; Optical packet switching; Optical switches; Receivers; Servers; Surface acoustic waves; Throughput

CN2: Cellular networks 2 4

148. "Wireless networks without edges": Dynamic radio resource clustering and user scheduling.

Paper Link】 【Pages】:1321-1329

【Authors】: Yuhuan Du ; Gustavo de Veciana

【Abstract】: Cellular systems using Coordinated Multi-Point (CoMP) transmissions leveraging clusters of spatially distributed radio antennas as Virtual Base Stations (VBSs) have the potential to realize overall throughput gains and, perhaps more importantly, can deliver substantial enhancement to poor performing “edge” users. In this paper we propose a novel framework aimed at fully exploiting the potential of such systems through dynamic radio resource clustering and user scheduling which maximize system utility. The dynamic clustering problem is modeled as a maximum weight clustering problem which is NP-hard, however, we show that by structuring the set of possible VBSs to be “2-decomposable” it can be efficiently computed. We also propose to optimize over a class of power allocation policies to radio resources, and thus VBSs, which allow dynamic user scheduling and flexible power allocations depending on instantaneous channel realizations. We use simulation to compare our approach with a state-of-the-art baseline which exploits dynamic frequency reuse and opportunistic user scheduling, but no clustering, and show edge users' throughput gains are as high as 80% without degrading the performance of others.

【Keywords】: cellular radio; computational complexity; mobile antennas; pattern clustering; scheduling; CoMP transmissions; NP-hard problem; cellular systems; coordinated multipoint transmissions; dynamic frequency reuse; dynamic radio resource clustering problem; edge user throughput gains; flexible power allocations; instantaneous channel realizations; maximum weight clustering problem; opportunistic user scheduling; power allocation policies; spatially distributed radio antennas; system utility maximization; virtual base stations; wireless networks; Dynamic scheduling; Heuristic algorithms; Interference; Optimized production technology; Processor scheduling; Resource management; Vectors

149. Cellular multi-coverage with non-uniform rates.

Paper Link】 【Pages】:1330-1338

【Authors】: Omer Gurewitz ; Yakov Sandomirsky ; Gabriel Scalosub

【Abstract】: Recent advances in the standardization of 4G cellular networks introduce the notion of multi-coverage, where multiple base stations may collaboratively satisfy the demands of mobile users. We provide a theoretical model for studying such multi-coverage environments, in highly heterogeneous settings, where users demands and profits may vary, as can base stations' capacities and the rates with which they can service the users. Whereas previous works provided solutions that were only applicable to scenarios where rates are uniform throughout the network, or allowed a mobile user to be serviced by at most one base station, we present several algorithms for the multi-coverage problem in the presence of non-uniform rates, and analyze their performance. We complete our study by a simulation study that further validates our results and provides further insight into algorithm design, depending on the users' characteristics.

【Keywords】: 4G mobile communication; cellular radio; 4G cellular networks; base stations; cellular multicoverage; Approximation algorithms; Approximation methods; Base stations; Computers; Conferences; Mobile communication; Resource management

150. Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms.

Paper Link】 【Pages】:1339-1347

【Authors】: Robert Margolies ; Ashwin Sridharan ; Vaneet Aggarwal ; Rittwik Jana ; N. K. Shankaranarayanan ; Vinay A. Vaishampayan ; Gil Zussman

【Abstract】: Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users' channel state diversity (induced by fast-fading), and are optimal for stationary channel state distributions and an infinite time-horizon. However, mobile users experience a non-stationary channel, due to slow-fading (on the order of seconds), and are associated with basestations for short periods. Hence, we develop the Predictive Finite-horizon PF Scheduling ((PF)2S) Framework that exploits mobility. We present extensive channel measurement results from a 3G network and characterize mobility-induced channel state trends. We show that a user's channel state is highly reproducible and leverage that to develop a data rate prediction mechanism. We then present a few channel allocation estimation algorithms that rely on the prediction mechanism. Our trace-based simulations consider instances of the PF2S Framework composed of combinations of prediction and channel allocation estimation algorithms. They indicate that the framework can increase the throughput by 15%-55% compared to traditional PF schedulers, while improving fairness.

【Keywords】: 3G mobile communication; cellular radio; channel allocation; channel estimation; diversity reception; fading channels; scheduling; 3G network; base stations; cellular networks; channel allocation estimation algorithms; channel measurement; channel state diversity; nonstationary channel; predictive finite horizon PF scheduling; proportional fair cellular scheduling; slow fading; Correlation; Delays; Market research; Mobile communication; Prediction algorithms; Scheduling; Cellular networks; Channel state prediction; Measurements; Mobility; Proportional fairness; Slow-fading

151. User mobility from the view of cellular data networks.

Paper Link】 【Pages】:1348-1356

【Authors】: Ying Zhang

【Abstract】: Understanding the user mobility is essential to resource optimization and algorithm evaluation in mobile networks, such as network planning, content distribution, and evaluation of hand-over mechanisms. Existing human mobility models focus on extracting mobility patterns from Call Detail Records (CDRs) or WiFi traces. While the former only captures movements during phone calls, the latter does not provide direct answers to mobility of cellular network users in a large scale. In this paper, we take the first step to investigate if the mobility properties derived from cellular data traffic is different from the previous findings using other data source, especially the commonly used CDR based approach. We present a comprehensive characterization of the mobility patterns from the cellular data networks' perspective, using a set of systematic methods. We find that the data network records can provide finer granularity of location and movement information. Three different temporal movement patterns are identified. Furthermore, we propose a new method for predicting future application usage given the mobility patterns and show promising results.

【Keywords】: cellular radio; mobility management (mobile radio); telecommunication congestion control; CDR; WiFi traces; algorithm evaluation; call detail records; cellular data networks; cellular data traffic; content distribution; data network records; hand-over mechanisms evaluation; location information; mobile networks; mobility patterns; movement information; network planning; resource optimization; systematic methods; temporal movement patterns; user mobility; Computers; Conferences; Entropy; Mobile communication; Mobile computing; Oscillators; Poles and towers

EE3: Energy efficiency in wireless networks 3 4

152. Energy efficient Wifi tethering on a smartphone.

Paper Link】 【Pages】:1357-1365

【Authors】: Kyoung-Hak Jung ; Yuepeng Qi ; Chansu Yu ; Young-Joo Suh

【Abstract】: While numerous efforts have been made to save energy of “client” devices but it has not been addressed for access points (APs) as they are assumed to be supported by AC power. This paper proposes E-MAP, which is an energy saving algorithm for a tethering smartphone that plays a role of mobile AP (MAP) temporarily. It saves MAP's energy by introducing the sleep cycle as in power save mode (PSM) in 802.11 but successfully keeps clients from transmitting while it sleeps. One important design goal of E-MAP is backward compatibility, i.e., it requires no modification on the client side and supports PSM and adaptive PSM (A-PSM) as well as normal constant awake mode (CAM) clients. Experiments show that E-MAP reduces the energy consumption of a Wifi tethering smartphone by up to 54% with a little impact on packet delay under various traffic patterns derived from real-life traces.

【Keywords】: packet radio networks; smart phones; telecommunication power management; telecommunication traffic; wireless LAN; A-PSM; CAM client; E-MAP; IEEE 802.11; MAP; adaptive PSM; client device; energy efficient Wi-Fi tethering; energy saving algorithm; mobile AP; normal constant awake mode; power save mode; sleep cycle; smartphone; traffic patterns; Bismuth; Computer aided manufacturing; Computers; Delays; IEEE 802.11 Standards; Protocols; Uplink

153. Fair energy-efficient sensing task allocation in participatory sensing with smartphones.

Paper Link】 【Pages】:1366-1374

【Authors】: Qingwen Zhao ; Yanmin Zhu ; Hongzi Zhu ; Jian Cao ; Guangtao Xue ; Bo Li

【Abstract】: With the proliferation of smartphones, participatory sensing using smartphones provides unprecedented opportunities for collecting enormous sensing data. There are two crucial requirements in participatory sensing, fair task allocation and energy efficiency, which are particularly challenging given high combinatorial complexity, tradeoff between energy efficiency and fairness, and dynamic and unpredictable task arrivals. In this paper, we present a novel fair energy-efficient allocation framework whose objective is characterized by min-max aggregate sensing time. We rigorously prove that optimizing the min-max aggregate sensing time is NP hard even when the tasks are assumed as a priori. We consider two allocation models: offline allocation and online allocation. For the offline allocation model, we design an efficient approximation algorithm with the approximation ratio of 2 - 1/m, where m is the number of member smartphones in the system. For the online allocation model, we propose a greedy online algorithm which achieves a competitive ratio of at most m. The results demonstrate that the approximation algorithm reduces over 81% total sensing time, the greedy online algorithm reduces more than 73% total sensing time, and both algorithms achieve over 3x better min-max fairness.

【Keywords】: approximation theory; computational complexity; energy conservation; greedy algorithms; smart phones; NP hard problem; combinatorial complexity; efficient approximation algorithm; greedy online algorithm; min-max aggregate sensing time; novel fair energy-efficient sensing task allocation framework; offline allocation model; online allocation model; participatory sensing; smartphones; Aggregates; Algorithm design and analysis; Approximation algorithms; Approximation methods; Resource management; Sensors; Smart phones

154. Improved structures for data collection in wireless sensor networks.

Paper Link】 【Pages】:1375-1383

【Authors】: Jon Crowcroft ; Michael Segal ; Liron Levin

【Abstract】: In this paper we consider the problem of efficient data gathering in sensor networks for arbitrary sensor node deployments. The efficiency of the solution is measured by a number of criteria: total energy consumption, total transport capacity, latency and quality of the transmissions. We present a number of different constructions with various tradeoffs between aforementioned parameters. We provide theoretical performance analysis for our approaches, present their distributed implementation and discuss the different aspects of using each. We show that in many cases our output-sensitive approximation solution performs better than the currently known best results for sensor networks. Our simulation results validate the theoretical findings.

【Keywords】: approximation theory; data communication; energy consumption; wireless sensor networks; arbitrary sensor node deployments; data collection; data gathering; energy consumption; output-sensitive approximation solution; theoretical performance analysis; transmission quality; transport capacity; wireless sensor networks; Approximation methods; Base stations; Computers; Conferences; Data collection; Energy consumption; Wireless sensor networks

155. Energy-efficient capacity optimization in wireless networks.

Paper Link】 【Pages】:1384-1392

【Authors】: Lu Liu ; Xianghui Cao ; Yu Cheng ; Lili Du ; Wei Song ; Yu Wang

【Abstract】: We study how to achieve optimal network capacity in the most energy-efficient manner over a general large-scale wireless network, say, a multi-hop multi-radio multi-channel (MR-MC) network. We develop a multi-objective optimization framework for computing the resource allocation that leads to optimal network capacity with minimal energy consumption. Our framework is based on a linear programming multi-commodity flow (MCF) formulation augmented with scheduling constraints over multi-dimensional conflict graph (MDCG). The optimization problem however involves finding all independent sets (ISs), which is NP-hard in general. Novel delayed column generation (DCG) based algorithms are developed to effectively solve the optimization problem. The DCG-based algorithms have significant advantages of low computation overhead and achieving high energy efficiency, compared to the common heuristic algorithm that randomly searches a large number of ISs to use. Extensive numerical results demonstrate the energy efficiency improvement by the proposed energy-efficient optimization techniques, over a wide range of networking scenarios.

【Keywords】: energy conservation; energy consumption; graph theory; linear programming; radio networks; resource allocation; telecommunication channels; DCG-based algorithms; MCF formulation; MDCG; MR-MC network; NP-hard; delayed column generation; energy consumption; energy efficiency; energy-efficient capacity optimization; energy-efficient optimization techniques; heuristic algorithm; independent sets; linear programming multi-commodity flow; multi-dimensional conflict graph; multi-objective optimization framework; multi-radio multi-channel network; optimal network capacity; optimization problem; resource allocation; scheduling constraints; wireless networks; Energy consumption; Interference; Linear programming; Optimization; Resource management; Search problems; Throughput; Multi-radio multi-channel network; capacity optimization; energy efficiency; multi-objective optimization

FN: Firewalls and network intrusion detection 4

156. ProWord: An unsupervised approach to protocol feature word extraction.

Paper Link】 【Pages】:1393-1401

【Authors】: Zhuo Zhang ; Zhibin Zhang ; Patrick P. C. Lee ; Yunjie Liu ; Gaogang Xie

【Abstract】: Protocol feature words are byte subsequences within traffic payload that can distinguish application protocols, and they form the building blocks of many constructions of deep packet analysis rules in network management, measurement, and security systems. However, how to systematically and efficiently extract protocol feature words from network traffic remains a challenging issue. Existing n-gram approaches simply break pay-load into equal-length pieces and are ineffective in capturing the hidden statistical structure of the payload content. In this paper, we propose ProWord, an unsupervised approach that extracts protocol feature words from traffic traces. ProWord builds on two nontrivial algorithms. First, we propose an unsupervised segmentation algorithm based on the modified Voting Experts algorithm, such that we break payload into candidate words according to entropy information and provide more accurate segmentation than existing n-gram approaches. Second, we propose a ranking algorithm that incorporates different types of well-known feature word retrieval heuristics, such that we can build an ordered structure on the candidate words and select the highest ranked ones as protocol feature words. We compare ProWord and existing n-gram approaches via evaluation on real-world traffic traces. We show that ProWord captures true protocol feature words more accurately and performs significantly faster.

【Keywords】: computer network management; computer network security; feature extraction; information retrieval; protocols; telecommunication traffic; unsupervised learning; word processing; ProWord; byte subsequences; deep packet analysis; entropy information; feature word retrieval heuristics; n-gram approach; network management; nontrivial algorithm; protocol feature word extraction; ranking algorithm; security system; statistical structure; traffic payload; traffic trace; unsupervised segmentation algorithm; voting expert algorithm; Algorithm design and analysis; Computers; Entropy; Feature extraction; Partitioning algorithms; Payloads; Protocols

157. TorWard: Discovery of malicious traffic over Tor.

Paper Link】 【Pages】:1402-1410

【Authors】: Zhen Ling ; Junzhou Luo ; Kui Wu ; Wei Yu ; Xinwen Fu

【Abstract】: Tor is a popular low-latency anonymous communication system. However, it is currently abused in various ways. Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we design and implement a novel system, TorWard, for the discovery and systematic study of malicious traffic over Tor. The system can avoid legal and administrative complaints and allows the investigation to be performed in a sensitive environment such as a university campus. An IDS (Intrusion Detection System) is used to discover and classify malicious traffic. We performed comprehensive analysis and extensive real-world experiments to validate the feasibility and effectiveness of TorWard. Our data shows that around 10% Tor traffic can trigger IDS alerts. Malicious traffic includes P2P traffic, malware traffic (e.g., botnet traffic), DoS (Denial-of-Service) attack traffic, spam, and others. Around 200 known malware have been identified. To the best of our knowledge, we are the first to perform malicious traffic categorization over Tor.

【Keywords】: computer network security; peer-to-peer computing; telecommunication network routing; telecommunication traffic; DoS; IDS; IDS alerts; P2P traffic; Tor exit routers; denial-of-service attack traffic; intrusion detection system; low-latency anonymous communication system; malicious traffic categorization; malicious traffic discovery; spam; Bandwidth; Computers; Logic gates; Malware; Mobile handsets; Ports (Computers); Servers; Intrusion Detection System; Malicious Traffic; Tor

158. Transductive malware label propagation: Find your lineage from your neighbors.

Paper Link】 【Pages】:1411-1419

【Authors】: Deguang Kong ; Guanhua Yan

【Abstract】: The numerous malware variants existing in the cyberspace have posed severe threats to its security. Supervised learning techniques have been applied to automate the process of classifying malware variants. Supervised learning, however, suffers in situations where we have only scarce labeled malware samples. In this work, we propose a transductive malware classification framework, which propagates label information from labeled instances to unlabeled ones. We improve the existing Harmonic function approach based on the maximum confidence principle. We apply this framework on the structural information collected from malware programs, and propose a PageRank-like algorithm to evaluate the distance between two malware programs. We evaluate the performance of our method against the standard Harmonic function method as well as two popular supervised learning techniques. Experimental results suggest that our method outperforms these existing approaches in classifying malware variants when only a small number of labeled samples are available.

【Keywords】: Harmonic analysis; Malware; Registers; Standards; Supervised learning; Support vector machines; Vectors

159. LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams.

Paper Link】 【Pages】:1420-1428

【Authors】: Qun Huang ; Patrick P. C. Lee

【Abstract】: Real-time characterization of traffic anomalies, such as heavy hitters and heavy changers, is critical for the robustness of operational networks, but its accuracy and scalability are challenged by the ever-increasing volume and diversity of network traffic. We address this problem by leveraging parallelization. We propose LD-Sketch, a data structure designed for accurate and scalable traffic anomaly detection using distributed architectures. LD-Sketch combines the classical counter-based and sketch-based techniques, and performs detection in two phases: local detection, which guarantees zero false negatives, and distributed detection, which reduces false positives by aggregating multiple detection results. We derive the error bounds and the space and time complexity for LD-Sketch. We compare LD-Sketch with state-of-the-art sketch-based techniques by conducting experiments on traffic traces from a real-life 3G cellular data network. Our results demonstrate the accuracy and scalability of LD-Sketch over prior approaches.

【Keywords】: 3G mobile communication; cellular radio; computational complexity; data structures; LD-sketch; counter-based technique; data structure; distributed detection; distributed sketching design; local detection; network data streams; real-life 3G cellular data network; sketch-based techniques; space complexity; time complexity; traffic anomaly detection; Accuracy; Arrays; Radiation detectors; Scalability; Time complexity

IM4: Internet monitoring and measurement 4 4

Paper Link】 【Pages】:1429-1437

【Authors】: MyungKeun Yoon ; JinWoo Son ; Seon-Ho Shin

【Abstract】: A Bloom filter is a compact and randomized data structure popularly used for networking applications. A standard Bloom filter only answers yes/no questions about membership, but recent studies have improved it so that the value of a queried item can be returned, supporting multiple-set membership testing. In this paper, we design a new data structure for multiple-set membership testing, Bloom tree, which not only achieves space compactness, but also operates more efficiently than existing ones. For example, when existing work requires 107 bits per item and 11 memory accesses for a search operation, a Bloom tree requires only 47 bits and 8 memory accesses. The advantages come from a new data structure that consists of multiple Bloom filters in a tree structure. We study a theoretical analysis model to find optimal parameters for Bloom trees, and its effectiveness is verified through experiments.

【Keywords】: data structures; query processing; set theory; Bloom filters; Bloom tree; data structure; memory access; multiple set membership testing; networking applications; optimal parameters; queried item; search operation; search tree; space compactness; Arrays; Computers; Encoding; Memory management; Testing; Vegetation

161. A longitudinal analysis of Internet rate limitations.

Paper Link】 【Pages】:1438-1446

【Authors】: João Taveira Araújo ; Raul Landa ; Richard G. Clegg ; George Pavlou ; Kensuke Fukuda

【Abstract】: TCP remains the dominant transport protocol for Internet traffic, but the preponderance of its congestion control mechanisms in determining flow throughput is often disputed. This paper analyzes the extent to which network, host and application settings define flow throughput over time and across autonomous systems. Drawing from a longitudinal study spanning five years of passive traces collected from a single transit link, our results show that continuing OS upgrades have reduced the influence of host limitations owing both to windowscale deployment, which by 2011 covered 80% of inbound traffic, and increased socket buffer sizes. On the other hand, we show that for this data set, approximately half of all inbound traffic remains throttled by constraints beyond network capacity, challenging the traditional model of congestion control in TCP traffic as governed primarily by loss and delay.

【Keywords】: Internet; telecommunication congestion control; telecommunication links; telecommunication traffic; transport protocols; Internet rate limitations; Internet traffic; OS; TCP; congestion control mechanisms; inbound traffic; network capacity; single transit link; socket buffer size; transport protocol; windowscale deployment; Bandwidth; Computers; Conferences; Internet; Receivers; Sockets; Throughput

162. Monitor placement for maximal identifiability in network tomography.

Paper Link】 【Pages】:1447-1455

【Authors】: Liang Ma ; Ting He ; Kin K. Leung ; Ananthram Swami ; Don Towsley

【Abstract】: We investigate the problem of placing a given number of monitors in a communication network to identify the maximum number of link metrics from end-to-end measurements between monitors, assuming that link metrics are additive, and measurement paths cannot contain cycles. Motivated by our previous result that complete identification of all link metrics can require a large number of monitors, we focus on partial identification using a limited number of monitors. The basis to our solution is an efficient algorithm for determining all identifiable links for a given monitor placement. Based on this algorithm, we develop a polynomial-time greedy algorithm to incrementally place monitors such that each newly placed monitor maximizes the number of additional identifiable links. We prove that the proposed algorithm is optimal for 2-vertex-connected networks, and demonstrate that it is near-optimal for several real ISP topologies that are not 2-vertex-connected. Our solution provides a quantifiable tradeoff between level of identifiability and available monitor resources.

【Keywords】: Internet; computational complexity; greedy algorithms; network theory (graphs); radio links; tomography; ISP topology; communication network; end-to-end measurement; link metrics identification; maximal identifiability; monitor placement problem; monitor resources; network tomography; partial identification; polynomial-time greedy algorithm; vertex connected network; Additives; Computers; Conferences; Electronic mail; Measurement; Monitoring; Routing

163. "Can you SEE me now?" A measurement study of mobile video calls.

Paper Link】 【Pages】:1456-1464

【Authors】: Chenguang Yu ; Yang Xu ; Bo Liu ; Yong Liu

【Abstract】: Video telephony is increasingly being adopted by end consumers. It is extremely challenging to deliver video calls over wireless networks. In this paper, we conduct a measurement study on three popular mobile video call applications: Face-Time, Google Plus Hangout, and Skype, over both WiFi and Cellular links. We study the following questions: 1) how they encode/decode video in realtime under tight resource constraints on mobile devices? 2) how they transmit video smoothly in the face of various wireless network impairments? 3) what is their delivered video conferencing quality under different mobile network conditions? 4) how different system architectures and design choices contribute to their delivered quality? Through detailed analysis of measurement results, we obtain valuable insights regarding the unique challenges, advantages and disadvantages of existing design solutions, and possible directions to deliver high-quality video calls in wireless networks.

【Keywords】: cellular radio; mobile radio; teleconferencing; telephony; wireless LAN; Face-Time; Google Plus Hangout; Skype; WiFi; cellular links; mobile video calls; video conferencing; video telephony; Computers; Delays; IEEE 802.11 Standards; Mobile communication; Packet loss; Smart phones

SN4: Sensor networks 4 4

Paper Link】 【Pages】:1465-1473

【Authors】: Yan Li ; Haibo Zhang ; Zhiyi Huang ; Michael Albert

【Abstract】: This paper investigates the problem of scheduling delay-constrained traffic in a single-hop wireless industrial network in which different source devices have different data rates. We aim to maximize the packet delivery reliability while meeting the deadline for each packet. The transmission scheduling problem is decomposed into two sub-problems: subperiod-based slot allocation and slot-based transmission scheduling. The former sub-problem is formulated as a nonlinear integer programming problem, and we present a solution with polynomial-time complexity by converting it to a linear integer programming problem. For the latter sub-problem, we demonstrate that the existence of a feasible optimal schedule depends on the order of the elements in the slot allocation vector produced by solving the former subproblem. An algorithm is designed to compute a feasible slot allocation that sustains a realizable schedule. Simulation results demonstrate that our scheme ensures each device has almost the same packet delivery rate in different report periods, which is important for maintaining the stability of control systems.

【Keywords】: computational complexity; integer programming; linear programming; nonlinear programming; scheduling; telecommunication traffic; wireless sensor networks; control system stability; delay-constrained periodic traffic; linear integer programming problem; nonlinear integer programming problem; optimal link scheduling; single-hop wireless industrial network; slot-based transmission scheduling; subperiod-based slot allocation; transmission scheduling problem; unreliable wireless links; wireless sensor networks; Job shop scheduling; Optimal scheduling; Resource management; Sensors; Wireless communication; Wireless sensor networks

165. Approximate multiple count in Wireless Sensor Networks.

Paper Link】 【Pages】:1474-1482

【Authors】: Xiaolin Fang ; Hong Gao ; Jianzhong Li ; Yingshu Li

【Abstract】: COUNT is a typical aggregation operation in Wireless Sensor Networks (WSNs). In such an operation, the total number of the items which are of the same kind is obtained and only one numerical value is returned as the result. This paper identifies the multiple count problem which counts items belonging to multiple categories. For each category, the total number of the items belonging to this category is calculated. Therefore, the returned result is a set of values instead of a single value. The multiple count problem is more challenging than the traditional count problem as the former incurs more communication overhead. This paper proposes a distributed approximate multiple count algorithm which can derive an error bounded result under a specified communication cost constraint for each node. The error of the derived result is hN/L, where h is the depth of the routing tree, N is the total number of all the items belonging to all the categories, and L is a representation of the communication cost constraint for each node. Furthermore, the weighted multiple count problem is investigated where different kinds of items to be counted have different weights. The proposed algorithms are evaluated through TOSSIM, a widely used simulation tool for WSNs. The theoretical analysis and simulation results both demonstrate the correctness and effectiveness of the proposed algorithms.

【Keywords】: approximation theory; telecommunication network routing; trees (mathematics); wireless sensor networks; TOSSIM; aggregation operation; approximate multiple count; communication cost constraint; distributed approximate multiple count algorithm; routing tree; wireless sensor networks; Aggregates; Approximation algorithms; Approximation methods; Carbon dioxide; Clustering algorithms; Monitoring; Wireless sensor networks

166. EV-sounding: A visual assisted electronic channel sounding system.

Paper Link】 【Pages】:1483-1491

【Authors】: Gang Li ; Jin Teng ; Fan Yang ; Adam C. Champion ; Dong Xuan ; Hong Luan ; Yuan F. Zheng

【Abstract】: Electronic channel sounding plays a vital role in developing wireless communication systems. It is critical for transceivers' equalization and filtering operations. However, current pure electronic channel sounding techniques are not well-suited for emerging scenarios such as opportunistic spectrum access, channel impulse response (CIR) based wireless positioning, and wireless security applications, which demand rapid, high-resolution, and spectrum agile channel measurements on commercial off-the-shelf (COTS) devices. To address these critical issues, this paper proposes EV-Sounding, a novel methodology for visual assisted electronic channel sounding. Based on frequency domain channel sounding, EV-Sounding leverages cameras for visual estimation of sparsity locations to reduce the number of frequency samples, thus speeding up the sounding process. EV-Sounding achieves both high-resolution CIR measurements and spectrum agility. We prototype an EV-Sounding system on COTS devices. Our real-world experimental results and extensive simulations validate EV-Sounding's performance.

【Keywords】: frequency-domain analysis; transient response; wireless channels; CIR based wireless positioning; COTS devices; EV-sounding leverages cameras; channel impulse response based wireless positioning; channel measurements; commercial off-the-shelf devices; electronic channel sounding techniques; filtering operations; frequency domain channel sounding; frequency samples; opportunistic spectrum access; sparsity locations; spectrum agility; transceivers equalization; wireless communication systems; wireless security applications; Cameras; Communication system security; Image reconstruction; Time-frequency analysis; Visualization; Wireless communication; Channel sounding; wireless measurement

167. Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem.

Paper Link】 【Pages】:1492-1500

【Authors】: Vikram P. Munishwar ; Vinay Kolar ; Nael B. Abu-Ghazaleh

【Abstract】: We consider the problem of target coverage in visual sensor networks with Pan-Tilt-Zoom (PTZ) cameras. The finely controllable movement in PTZ dimensions creates a large number of possible Field-of-View (FoV) settings, making it prohibitively expensive to consider them all in coverage algorithms. However, these FoVs are redundant as each group of targets is generally covered by many FoVs. Thus, an important problem is, how to identify FoVs that cover all maximal subsets of targets (MaxFoV) efficiently? We show that MaxFoV is an instance of generating all maximal cliques, which is NP-hard in general but polynomial if the number of cliques is polynomial. We construct an optimal algorithm to solve the problem with a worst case complexity of O(n3). Simulation and testbed experiments show that the algorithm drastically reduces the number of FoVs allowing multi-camera coverage to scale without sacrificing coverage quality.

【Keywords】: computational complexity; video cameras; visual communication; wireless sensor networks; MaxFoV problem; NP-hard problem; PTZ; field of view; maximal clique generation; multicamera coverage; pan-tilt-zoom camera; polynomial; visual sensor network; worst case complexity; Cameras; Complexity theory; Computers; Conferences; Polynomials; Shape; Visualization

WS3: wireless ecurity and privacy 3 4

168. How can botnets cause storms? Understanding the evolution and impact of mobile botnets.

Paper Link】 【Pages】:1501-1509

【Authors】: Zhuo Lu ; Wenye Wang ; Cliff Wang

【Abstract】: A botnet in mobile networks is a collection of compromised nodes due to mobile malware, which are able to perform coordinated attacks. Different from Internet botnets, mobile botnets do not need to propagate using centralized infrastructures, but can keep compromising vulnerable nodes in close proximity and evolving organically via data forwarding. Such a distributed mechanism relies heavily on node mobility as well as wireless links, therefore breaks down the underlying premise in existing epidemic modeling for Internet botnets. In this paper, we adopt a stochastic approach to study the evolution and impact of mobile botnets. We find that node mobility can be a trigger to botnet propagation storms: the average size (i.e., number of compromised nodes) of a botnet increases quadratically over time if the mobility range that each node can reach exceeds a threshold; otherwise, the botnet can only contaminate a limited number of nodes with average size always bounded above. This also reveals that mobile botnets can propagate at the fastest rate of quadratic growth in size, which is substantially slower than the exponential growth of Internet botnets. To measure the denial-of-service impact of a mobile botnet, we define a new metric, called last chipper time, which is the last time that service requests, even partially, can still be processed on time as the botnet keeps propagating and launching attacks. The last chipper time is identified to decrease at most on the order of 1/√B, where B is the network bandwidth. This result reveals that although increasing network bandwidth can help with mobile services; at the same time, it can indeed escalate the risk for services being disrupted by mobile botnets.

【Keywords】: computer network security; invasive software; mobile computing; Internet botnets; botnet propagation storms; compromised nodes; coordinated attacks; data forwarding; denial-of-service impact; distributed mechanism; epidemic modeling; exponential growth; last chipper time; mobile botnets; mobile malware; mobile networks; mobile services; mobility range; network bandwidth; node mobility; quadratic growth; service requests; wireless links; Internet; Malware; Mobile computing; Mobile nodes; Peer-to-peer computing

169. COLLECTOR: A secure RFID-enabled batch recall protocol.

Paper Link】 【Pages】:1510-1518

【Authors】: Saiyu Qi ; Yuanqing Zheng ; Mo Li ; Li Lu ; Yunhao Liu

【Abstract】: Batch recall is a practically important problem for most industry manufacturers. The batches of products which contain flawed parts need to be recalled by manufacturers in time to prevent further economic and health loss. Accurate batch recall could be a challenging issue as flawed parts may have already been integrated into a large number of products and distributed to customers. The recent development of Radio Frequency Identification (RFID) provides us a promising opportunity to implement batch recall in an accurate and efficient way. RFID-enabled batch recall provides us the opportunity to further enhance the security of batch recall operation, allowing us to achieve recognition of problematic products, privacy preserving of production pattern, recall authentication and non-repudiation, etc. In this paper, we thoroughly study the security aspects and identify the unique requirements in RFID-enabled batch recall. We propose a practically secure protocol, COLLECTOR, to enable accurate, secure and efficient RFID batch recall.

【Keywords】: batch processing (industrial); batch production systems; radiofrequency identification; COLLECTOR; industry manufacturers; privacy preserving; production pattern; radio frequency identification; recall authentication; secure RFID-enabled batch recall protocol operation; Authentication; Computers; Indexes; Production; Protocols; Radiofrequency identification; RFID; batch recall; security

170. Analysis and detection of SIMbox fraud in mobility networks.

Paper Link】 【Pages】:1519-1526

【Authors】: Ilona Murynets ; Michael Zabarankin ; Roger Piqueras Jover ; Adam Panagia

【Abstract】: Voice traffic termination fraud, often referred to as Subscriber Identity Module box (SIMbox) fraud, is a common illegal practice on mobile networks. As a result, cellular operators around the globe lose billions annually. Moreover, SIMboxes compromise the cellular network infrastructure by overloading local base stations serving these devices. This paper analyzes the fraudulent traffic from SIMboxes operating with a large number of SIM cards. It processes hundreds of millions of anonymized voice call detail records (CDRs) from one of the main cellular operators in the United States. In addition to overloading voice traffic, fraudulent SIMboxes are observed to have static physical locations and to generate disproportionately large volume of outgoing calls. Based on these observations, novel classifiers for fraudulent SIMbox detection in mobility networks are proposed. Their outputs are optimally fused to increase the detection rate. The operator's fraud department confirmed that the algorithm succeeds in detecting new fraudulent SIMboxes.

【Keywords】: cellular radio; fraud; mobile computing; pattern classification; security of data; telecommunication traffic; voice communication; SIM cards; SIMbox fraud analysis; SIMbox fraud detection; United States; anonymized voice call detail records; cellular network infrastructure; classifiers; fraudulent SIMboxes; mobile networks; mobility networks; subscriber identity module fraud; voice traffic termination fraud; Base stations; Computers; Conferences; Mobile communication; Mobile computing; Receivers; Wireless communication

171. Scaling laws for secrecy capacity in cooperative wireless networks.

Paper Link】 【Pages】:1527-1535

【Authors】: Mahtab Mirmohseni ; Panagiotis Papadimitratos

【Abstract】: We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interference-limited communications considered in prior works, we propose active cooperative relaying based schemes. We consider a network with nl legitimate nodes and ne eavesdroppers, and path loss exponent α ≥ 2. As long as ne2(log(ne))γ = o(nl) holds for some positive γ, we show one can obtain unbounded secure aggregate rate. This means zero-cost secure communication, given a fixed total power constraint for the entire network. We achieve this result with (i) the source using Wyner randomized encoder and a serial (multi-stage) block Markov scheme, to cooperate with the relays, and (ii) the relays acting as a virtual multi-antenna to apply beamforming against the eavesdroppers. Our simpler parallel (two-stage) relaying scheme can achieve the same unbounded secure aggregate rate when neα/2 + 1 (log(ne))γ+δ(α/2+1) = o(nl) holds, for some positive γ, δ.

【Keywords】: Markov processes; array signal processing; cooperative communication; interference (signal); relay networks (telecommunication); telecommunication security; Wyner randomized encoder; active cooperative relaying; beamforming; cooperative wireless networks; interference limited communications; parallel relaying scheme; path loss exponent; scaling laws; secrecy capacity; secure communication; serial block Markov scheme; Aggregates; Array signal processing; Encoding; Relays; Tin; Transmitters; Wireless networks

CN3: Cellular networks 3 4

172. Fast resource scheduling in HetNets with D2D support.

Paper Link】 【Pages】:1536-1544

【Authors】: Francesco Malandrino ; Claudio Casetti ; Carla-Fabiana Chiasserini ; Zana Limani

【Abstract】: Resource allocation in LTE networks is known to be an NP-hard problem. In this paper, we address an even more complex scenario: an LTE-based, 2-tier heterogeneous network where D2D mode is supported under the network control. All communications (macrocell, microcell and D2D-based) share the same frequency bands, hence they may interfere. We then determine (i) the network node that should serve each user and (ii) the radio resources to be scheduled for such communication. To this end, we develop an accurate model of the system and apply approximate dynamic programming to solve it. Our algorithms allow us to deal with realistic, large-scale scenarios. In such scenarios, we compare our approach to today's networks where eICIC techniques and proportional fairness scheduling are implemented. Results highlight that our solution increases the system throughput while greatly reducing energy consumption. We also show that D2D mode can effectively support content delivery without significantly harming macrocells or microcells traffic, leading to an increased system capacity. Interestingly, we find that D2D mode can be a low-cost alternative to microcells.

【Keywords】: Long Term Evolution; computational complexity; dynamic programming; energy consumption; microcellular radio; radiofrequency interference; resource allocation; scheduling; telecommunication control; telecommunication power management; telecommunication traffic; D2D mode; D2D support; D2D-based communication; HetNets; LTE networks; LTE-based heterogeneous network; NP-hard problem; content delivery; device-to-device support; dynamic programming; eICIC techniques; energy consumption; fast resource scheduling; macrocell communication; macrocell traffic; microcell communication; microcell traffic; network control; network node; proportional fairness scheduling; radio resources; resource allocation; system capacity; system throughput; two-tier heterogeneous network; Complexity theory; Conferences; Dynamic programming; Interference; Macrocell networks; Microcell networks; Resource management

173. INDAPSON: An incentive data plan sharing system based on self-organizing network.

Paper Link】 【Pages】:1545-1553

【Authors】: Tuo Yu ; Zilong Zhou ; Da Zhang ; Xinbing Wang ; Yunxin Liu ; Songwu Lu

【Abstract】: The contradiction between dynamic user traffic and fixed data plans has drawn increasing attention in the field of mobile applications. In this paper we build a data plan sharing system named INDAPSON to consider a scenario where some smartphone users have surplus data traffic and are willing to help others download data. Virtual credits can be gained as reward, which can be used to ask for future help in downloading. To realize this model, we make the following contributions: 1) A dynamic self-organization strategy to adapt to mobile terminals; 2) An incentive mechanism named RAP to encourage participation; 3) Power-saving strategies to reduce power consumption. The main advantage of our system is that users gain improvement in download rate while being able to convert their surplus data traffic to virtual credits. The results of experiment and simulation show that users in our system can manage their surplus data plan more efficiently while a highspeed download rate can be achieved.

【Keywords】: incentive schemes; mobile computing; smart phones; telecommunication power management; telecommunication traffic; INDAPSON; RAP; data traffic; dynamic self-organization strategy; dynamic user traffic; high-speed download rate; incentive data plan sharing system based on self-organizing network; incentive mechanism; mobile applications; mobile terminals; power consumption reduction; power-saving strategies; smartphone users; surplus data traffic; Bluetooth; Gold; IEEE 802.11 Standards; Internet; Mobile communication; Servers; Wireless communication

174. A mean field game approach to scheduling in cellular systems.

Paper Link】 【Pages】:1554-1562

【Authors】: Mayank Manjrekar ; Vinod Ramaswamy ; Srinivas Shakkottai

【Abstract】: We study auction-theoretic scheduling in cellular networks using the idea of mean field equilibrium (MFE). Here, agents model their opponents through a distribution over their action spaces and play the best response. The system is at an MFE if this action is itself a sample drawn from the assumed distribution. In our setting, the agents are smart phone apps that generate service requests, experience waiting costs, and bid for service from base stations. We show that if we conduct a second-price auction at each base station, there exists an MFE that would schedule the app with the longest queue at each time. The result suggests that auctions can attain the same desirable results as queue-length-based scheduling. We present results on the asymptotic convergence of a system with a finite number of agents to the mean field case, and conclude with simulation results illustrating the simplicity of computation of the MFE.

【Keywords】: cellular radio; game theory; scheduling; smart phones; auction-theoretic scheduling; base stations; cellular networks; cellular systems; mean field equilibrium; mean field game; smart phone; Base stations; Bayes methods; Computational modeling; Conferences; Games; Markov processes; Random variables

175. R2D2: Embracing device-to-device communication in next generation cellular networks.

Paper Link】 【Pages】:1563-1571

【Authors】: Tarun Bansal ; Karthikeyan Sundaresan ; Sampath Rangarajan ; Prasun Sinha

【Abstract】: Device-to-device (D2D) communications is being pursued as an important feature in next generation cellular networks. D2D can improve resource utilization in two ways: Offloading cellular traffic to D2D, and Reuse of resources used by conventional cellular transmissions for D2D communication. In this paper, we show that in multi-cell environments that employ FFR (Fractional Frequency Reuse), the benefits from D2D toward reuse are limited. We then propose R2D2- a holistic approach to efficient offloading with D2D traffic. R2D2 leverages the flexible nature of D2D traffic (in using downlink/uplink resources) to cater effectively to the spatial and temporal asymmetry in traffic load both across and within cells. R2D2 incorporates a two time-scale solution: a coarse time-scale dynamic FFR scheme that leverages D2D traffic to determine the FFR patterns for downlink and uplink jointly among interfering sectors; and a fine time-scale scheduling solution that intelligently schedules cellular and D2D traffic jointly across DL (Downlink) and UL (Uplink) resources. We establish the hardness of the scheduling problem and present efficient and low complexity algorithms with approximation guarantees. Through extensive evaluations, we confirm that R2D2 delivers the offloading benefits of D2D, with its proposed algorithms performing very close to the optimal.

【Keywords】: cellular radio; frequency allocation; next generation networks; telecommunication congestion control; D2D communications; D2D traffic; R2D2; cellular transmissions; device-to-device communication; fine time-scale scheduling solution; fractional frequency reuse; multicell environments; next generation cellular networks; offloading cellular traffic; resource utilization; spatial asymmetry; temporal asymmetry; time-scale dynamic FFR scheme; traffic load; Base stations; Dynamic scheduling; Heuristic algorithms; Interference; Resource management; Throughput; Uplink

DC1: Data center networking 1 4

176. On efficient bandwidth allocation for traffic variability in datacenters.

Paper Link】 【Pages】:1572-1580

【Authors】: Jian Guo ; Fangming Liu ; Xiaomeng Huang ; John C. S. Lui ; Mi Hu ; Qiao Gao ; Hai Jin

【Abstract】: Datacenter networks suffer unpredictable performance due to a lack of application level bandwidth guarantees. A lot of attentions have been drawn to solve this problem such as how to provide bandwidth guarantees for Virtualized Machines (VMs), proportional bandwidth share among tenants, and high network utilization under peak traffic. However, existing solutions fail to cope with highly dynamic traffic in datacenter networks. In this paper, we consider the effects of large numbers of short flows and massive bursty traffic in the datacenter, and design a novel distributed rate allocation algorithm based on the Logistic model under the control-theoretic framework. The theoretical analysis and experimental results using OpenFlow show that our algorithm not only guarantees the bandwidth for VMs, but also provides fast convergence to efficiency and fairness, and smooth response to bursty traffic.

【Keywords】: bandwidth allocation; computer centres; telecommunication traffic; virtual machines; OpenFlow; VM; application level bandwidth guarantees; bandwidth allocation; control-theoretic framework; datacenter networks; distributed rate allocation algorithm; high network utilization; logistic model; massive bursty traffic; proportional bandwidth share; traffic variability; virtualized machines; Algorithm design and analysis; Bandwidth; Channel allocation; Convergence; Heuristic algorithms; Logistics; Resource management

177. RepFlow: Minimizing flow completion times with replicated flows in data centers.

Paper Link】 【Pages】:1581-1589

【Authors】: Hong Xu ; Baochun Li

【Abstract】: Short TCP flows that are critical for many interactive applications in data centers are plagued by long flows and head-of-line blocking in switches. Hash-based load balancing schemes such as ECMP aggravate the matter and result in long-tailed flow completion times (FCT). Previous work on reducing FCT usually requires custom switch hardware and/or protocol changes. We propose RepFlow, a simple yet practically effective approach that replicates each short flow to reduce the completion times, without any change to switches or host kernels. With ECMP the original and replicated flows traverse distinct paths with different congestion levels, thereby reducing the probability of having long queueing delay. We develop a simple analytical model to demonstrate the potential improvement. Further, we conduct NS-3 simulations and Mininet implementation and show that RepFlow provides 50%-70% speedup in both mean and 99-th percentile FCT for all loads, and offers near-optimal FCT when used with DCTCP.

【Keywords】: computer centres; computer networks; interactive systems; queueing theory; resource allocation; transport protocols; DCTCP; ECMP; FCT; Mininet implementation; NS-3 simulations; RepFlow; TCP flows; analytical model; congestion levels; custom switch hardware; data centers; flow completion times; hash-based load balancing schemes; head-of-line blocking; interactive applications; protocol changes; queueing delay; replicated flows; Computers; Conferences; Delays; Load management; Load modeling; Transport protocols; Web search

178. Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective.

Paper Link】 【Pages】:1590-1598

【Authors】: Marco Chiesa ; Guy Kindler ; Michael Schapira

【Abstract】: To efficiently exploit network resources operators do traffic engineering (TE), i.e., adapt the routing of traffic to the prevailing demands. TE in large IP networks typically relies on configuring static link weights and splitting traffic between the resulting shortest-paths via the Equal-Cost-MultiPath (ECMP) mechanism. Yet, despite its vast popularity, crucial operational aspects of TE via ECMP are still little-understood from an algorithmic viewpoint. We embark upon a systematic algorithmic study of TE with ECMP. We consider the standard model of TE with ECMP and prove that, in general, even approximating the optimal link-weight configuration for ECMP within any constant ratio is an intractable feat, settling a long-standing open question. We establish, in contrast, that ECMP can provably achieve optimal traffic flow for the important category of Clos datacenter networks. We last consider a well-documented shortcoming of ECMP: suboptimal routing of large (“elephant”) flows. We present algorithms for scheduling “elephant” flows on top of ECMP (as in, e.g., Hedera [1]) with provable approximation guarantees. Our results complement and shed new light on past experimental and empirical studies of the performance of TE with ECMP.

【Keywords】: IP networks; telecommunication network routing; ECMP mechanism; IP networks; TE; algorithmic perspective; datacenter networks; equal cost multipath; optimal link weight configuration; optimal traffic flow; splitting traffic; static link weights; traffic engineering; traffic routing; Approximation algorithms; Computers; Conferences; Educational institutions; Network topology; Routing; Standards

179. Towards performance-centric fairness in datacenter networks.

Paper Link】 【Pages】:1599-1607

【Authors】: Li Chen ; Yuan Feng ; Baochun Li ; Bo Li

【Abstract】: Fair bandwidth allocation in datacenter networks has been a focus of research recently, yet this has not received adequate attention in the context of private cloud, where link bandwidth is often shared among applications running data parallel frameworks, such as MapReduce. In this paper, we introduce a rigorous definition of performance-centric fairness, with the guiding principle that the performance of data parallel applications should be proportional to their weights. We investigate the problem of maximizing application performance while maintaining strict performance-centric fairness and present the inherent tradeoff between resource utilization and fairness. We then formulate the link bandwidth allocation problem with the objective of maximizing social welfare across all applications, so that resource utilization can be manipulated and improved by allowing a tunable degree of relaxation on performance-centric fairness. Based on dual based decomposition, we present a distributed algorithm to solve this problem, and evaluate its performance with extensive simulations.

【Keywords】: bandwidth allocation; computer centres; computer network performance evaluation; distributed algorithms; telecommunication links; MapReduce; bandwidth allocation; bandwidth link sharing; data parallel applications; datacenter networks; distributed algorithm; performance-centric fairness; Bandwidth; Channel allocation; Computers; Conferences; Optimization; Resource management; Servers

FT1: Fault tolerance and survivability 1 4

180. Geometric evaluation of survivability of disaster-affected network with probabilistic failure.

Paper Link】 【Pages】:1608-1616

【Authors】: Hiroshi Saito

【Abstract】: This paper presents an algorithm for evaluating the probability that connectivity can be maintained between two given nodes in a physical network affected by a disaster. Nodes and links in a disaster area are probabilistically broken, and the disaster area is modeled using a half plane. This paper also proves that this probability of connectivity increases for a generic network topology when the perimeter length of the convex hull of a physical link route decreases, and that it becomes maximum when these physical link routes become straight line segments. In addition, this paper proposes an optimal server placement method by considering robustness against disaster and an optimal link/node replacement strategy determining which nodes or links should be replaced with those robust against disaster. Intuitive node (link) replacement strategies are also suggested based on the analysis of this paper.

【Keywords】: probability; telecommunication network planning; telecommunication network reliability; telecommunication network topology; connectivity probability; geometric evaluation; network survivability; network topology; optimal node replacement; optimal server placement; physical link routes; probabilistic failure; Analytical models; Approximation methods; Computers; Conferences; Measurement; Polynomials; Robustness

Paper Link】 【Pages】:1617-1625

【Authors】: Baohua Yang ; Junda Liu ; Scott Shenker ; Jun Li ; Kai Zheng

【Abstract】: Handling link failures is the fundamental task of routing schemes. Routing protocols based on link state (e.g., OSPF) require a global state advertisement and re-computation when link failure happens, and will cause inevitable delivery failures. To improve the routing resilience without introducing significant extra overhead, we propose a new routing approach, Keep Forwarding (KF) to achieve k-link failure resilience using inport-aware forwarding. KF is (i) flexible to handle multiple failures (or k-failure) with only small path stretch, (ii) efficient in recovery speed by instant and local lookup, (iii) bounded on memory requirement. Besides, the proposed approach is compatible with existing Internet protocols and routing infrastructures (e.g., requires no packet labeling or state recording), and the pre-computation has a linear temporal complexity. Experimental results on real ISP and datacenter networks reveal that KF guarantees near-optimal resilience (99.9%~100% for single failure and over 99.7% for multiple failures), with the average path stretch increment less than 5%.

【Keywords】: Internet; computational complexity; computer network reliability; failure analysis; routing protocols; ISP; Internet protocols; KF; data center networks; global state advertisement; inport-aware forwarding; k-link failure resilient routing; keep forwarding; linear temporal complexity; routing infrastructures; routing protocols; Computers; Conferences; IP networks; Ports (Computers); Resilience; Routing; Topology

182. Restorable logical topology in the face of no or partial traffic demand knowledge.

Paper Link】 【Pages】:1626-1634

【Authors】: Reuven Cohen ; Gabi Nakibly

【Abstract】: The construction of a logical network on top of a physical (optical) infrastructure involves two intertwined tasks: logical link selection - deciding which pairs of routers will be connected by logical links (lightpaths), and logical link routing - deciding how to route each logical link across the optical network. The operator of such networks is often required to maximize the available throughput while guaranteeing its restorability. This paper is the first to combine these seemingly conflicting goals into one optimization criterion: maximizing the restorable throughput of the end-to-end paths. We address this problem in three cases: when the operator has no knowledge of the future bandwidth demands, when it has partial knowledge, and when it has full knowledge. We present efficient algorithms for each of these cases and use extensive simulations to compare their performance.

【Keywords】: optical links; optimisation; telecommunication network routing; telecommunication network topology; logical link routing; logical link selection; logical topology; optical network; optimization criterion; restorable network throughput; traffic demand knowledge; Approximation algorithms; Approximation methods; Bandwidth; Optical fiber networks; Routing; Throughput

183. Max-flow min-cut theorem and faster algorithms in a circular disk failure model.

Paper Link】 【Pages】:1635-1643

【Authors】: Yusuke Kobayashi ; Kensuke Otsuki

【Abstract】: Fault-tolerance is one of the most important factors in designing networks. Failures in networks are sometimes caused by an event occurring in specific geographical regions such as hurricanes, earthquakes, bomb attacks, and Electromagnetic Pulse (EMP) attacks. In INFOCOM 2012, Neumayer et al. introduced geographical variants of max-flow min-cut problems in a circular disk failure model, in which each failure is represented by a disk with a predetermined size. In this paper, we solve two open problems in this model: we give a first polynomial-time algorithm for the geographic max-flow problem, and prove a conjecture of Neumayer et al. on a relationship between the geographic max-flow and the geographic min-cut.

【Keywords】: communication complexity; fault tolerance; minimax techniques; radio networks; telecommunication network planning; telecommunication network reliability; bomb attacks; circular disk failure model; earthquakes; electromagnetic pulse; fault tolerance; geographic max-flow min-cut theorem; geographical region; geographical variant; hurricanes; network design; polynomial-time algorithm; Clocks; Computational modeling; Computers; Conferences; Face; Joining processes; Polynomials

SB1: Scheduling and buffer management 1 4

184. Distributed backup scheduling: Modeling and optimization.

Paper Link】 【Pages】:1644-1652

【Authors】: Peter M. van de Ven ; Bo Zhang ; Angela Schörgendorfer

【Abstract】: Recent years have seen rapid growth in data storage, magnifying the importance of ensuring data safety by performing regular backups. However, traffic created by such backups can be a significant burden on the underlying communication network. In the present paper we address the tradeoff between frequent backups (increased safety) and reducing the network peak load. We address the problem of shifting backup traffic from peak hours to off-peak hours within the constraints imposed by user connectivity. Backups are scheduled using a distributed protocol characterized by a set of probabilities that indicate the likelihood of a user initiating a backup during a given hour. Given these probabilities, we study the network capacity by investigating the rate at which users can generate data while retaining stable backlog processes. We then derive explicit expressions for the stationary behavior of the backup process, and discuss how to choose the backup probabilities that strike the right balance between a low peak load and data safety. Via simulation experiments we show that this approach is highly successful in reducing costs.

【Keywords】: distributed processing; scheduling; security of data; backup traffic; communication network; data safety; data storage; distributed backup scheduling; distributed protocol; frequent backups; modeling; network capacity; network peak load; optimization; stable backlog processes; user connectivity; Computers; Conferences; Data models; Distributed databases; Safety; Servers; Stability analysis

185. Fast and simple approximation algorithms for maximum weighted independent set of links.

Paper Link】 【Pages】:1653-1661

【Authors】: Peng-Jun Wan ; Xiaohua Jia ; Guojun Dai ; Hongwei Du ; Ophir Frieder

【Abstract】: Finding a maximum-weighted independent set of links is a fundamental problem in wireless networking and has broad applications in various wireless link scheduling problems. Under protocol interference model, it is NP-hard even when all nodes have uniform (and fixed) interference radii and the positions of all nodes are available. On one hand, it admits a polynomial-time approximation scheme (PTAS). In other words, for any fixed ε > 0, it has a polynomial-time (depending on ε) (1 + ε)-approximation algorithm. However, such PTAS is of theoretical interest only and is quite infeasible practically. On the other hand, only with the uniform interference radii is a simple (greedy) constant-approximation algorithm known. For the arbitrary interference radii, fast constant-approximation algorithms are still missing. In this paper, we present a number of fast and simple approximation algorithms under the general protocol interference model. When applied to the plane geometric variants of the protocol interference model, these algorithms produce constant-approximate solutions efficiently.

【Keywords】: approximation theory; optimisation; protocols; radio links; radio networks; radiofrequency interference; scheduling; NP-hard; PTAS; constant-approximation algorithm; maximum-weighted independent set of links; polynomial-time approximation scheme; protocol interference model; wireless link scheduling problems; wireless networking; Approximation algorithms; Approximation methods; Conferences; Interference; Personal digital assistants; Protocols

186. A high-order Markov chain based scheduling algorithm for low delay in CSMA networks.

Paper Link】 【Pages】:1662-1670

【Authors】: Jaewook Kwak ; Chul-Ho Lee ; Do Young Eun

【Abstract】: Recently, several CSMA algorithms based on the Glauber dynamics model have been proposed for multihop wireless scheduling, as viable solutions to achieve the throughput optimality, yet simple to implement. However, their delay performance still remains unsatisfactory, mainly due to the nature of the underlying Markov chains that imposes a fundamental constraint on how the link state can evolve over time. In this paper, we propose a new approach toward better queueing delay performance, based on our observation that the algorithm needs not be Markovian, as long as it can be implemented in a distributed manner. Our approach hinges upon utilizing past state information observed by local link and then constructing a high-order Markov chain for the evolution of the feasible link schedules. We show in theory and simulation that our proposed algorithm, named delayed CSMA, achieves the throughput optimality, and also provides much better delay performance by effectively `de-correlating' the link state process (and thus resolves link starvation). Our extensive simulations demonstrate that the delay under our algorithm can be often reduced by a factor of 20 over a wide range of scenarios, compared to the standard Glauber-dynamics-based CSMA algorithm.

【Keywords】: Markov processes; carrier sense multiple access; queueing theory; CSMA networks; Glauber dynamics model; high-order Markov chain based scheduling algorithm; link state process; multihop wireless scheduling; queueing delay performance; Correlation; Delays; Heuristic algorithms; Markov processes; Multiaccess communication; Schedules; Throughput

187. Scheduling of multicast and unicast services under limited feedback by using rateless codes.

Paper Link】 【Pages】:1671-1679

【Authors】: Yin Sun ; Can Emre Koksal ; Kyu-Han Kim ; Ness B. Shroff

【Abstract】: Many opportunistic scheduling techniques are impractical because they require accurate channel state information (CSI) at the transmitter. In this paper, we investigate the scheduling of unicast and multicast services in a downlink network with a very limited amount of feedback information. Specifically, unicast users send imperfect (or no) CSI and infrequent acknowledgements (ACKs) to a base station, and multicast users only report infrequent ACKs to avoid feedback implosion. We consider the use of physical-layer rateless codes, which not only combats channel uncertainty, but also reduces the overhead of ACK feedback. A joint scheduling and power allocation scheme is developed to realize multiuser diversity gain for unicast service and multicast gain for multicast service. We prove that our scheme achieves a near-optimal throughput region. Our simulation results show that our scheme significantly improves the network throughput over schemes employing fixed-rate codes or using only unicast communications.

【Keywords】: encoding; scheduling; transmitters; wireless channels; ACK; CSI; base station; channel state information; channel uncertainty; downlink network; feedback information; infrequent acknowledgements; joint scheduling; limited feedback; multicast services; opportunistic scheduling techniques; physical layer rateless codes; power allocation scheme; rateless codes; transmitter; unicast communications; unicast services; Base stations; Decoding; Downlink; Mutual information; Resource management; Throughput; Unicast

SC1: Social computing and networks 1 4

188. LBSNSim: Analyzing and modeling location-based social networks.

Paper Link】 【Pages】:1680-1688

【Authors】: Wei Wei ; Xiaojun Zhu ; Qun Li

【Abstract】: The soaring adoption of location-based social networks (LBSNs) makes it possible to analyze human socio-spatial behaviors based on large-scale realistic data, which is important to both the research community and the design of new location-based social applications. However, performing direct measurements on LBSNs is impractical, because of the security mechanisms of existing LBSNs, and high time and resource costs. The problem is exacerbated by the scarcity of available LBSN datasets, which is mainly due to the privacy concerns and the hardness of distributing large-volume data. As a result, only a very few number of LBSN datasets are publicly released. In this paper, we extract and study the universal statistical features of three LBSN datasets, and propose LBSNSim, a trace-driven model for generating synthetic LBSN datasets capturing the properties of the original datasets. Our evaluation shows that LBSNSim provides an accurate representation of target LBSNs.

【Keywords】: behavioural sciences computing; data privacy; mobile computing; security of data; social networking (online); statistical analysis; LBSNSim; human socio-spatial behavior analysis; large-scale realistic data; large-volume data distribution; location-based social networks; resource costs; security mechanisms; synthetic LBSN dataset generation; trace-driven model; universal statistical features; Computers; Conferences; Data privacy; Feature extraction; Method of moments; Probability density function; Social network services

189. On designing neighbor discovery protocols: A code-based approach.

Paper Link】 【Pages】:1689-1697

【Authors】: Tong Meng ; Fan Wu ; Guihai Chen

【Abstract】: In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric duty cycles can still be improved. In this work, we investigate asynchronous neighbor discovery through a code-based approach, including the symmetric and asymmetric cases. We derive the tight worst-case latency bound in the case of symmetric duty cycle. We design a novel class of symmetric patterns called Diff-Codes, which is optimal when the Diff-Code can be extended from a perfect difference set. We further consider the asymmetric case, and design ADiff-Codes. To evaluate (A)Diff-Codes, we conduct both simulations and testbed experiments. Both simulation and experiment results show that (A)Diff-Codes significantly outperform existing neighbor discovery protocols in both the median case and worst-case. Specifically, in symmetric case, the maximum worst-case improvement is up to 50%; in both symmetric and asymmetric cases, the median case gain is as high as 30%.

【Keywords】: mobile radio; protocols; ADiff-Codes; Diff-Codes; asymmetric duty cycles; code-based approach; energy-efficient neighbor discovery protocols; mobile wireless networks; neighbor discovery protocols; optimal worst-case latency; proximity-based applications; symmetric duty cycle; Computers; Conferences; Mobile communication; Mobile computing; Probabilistic logic; Protocols; Wireless networks

190. Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic.

Paper Link】 【Pages】:1698-1706

【Authors】: Guangchi Liu ; Qing Yang ; Honggang Wang ; Xiaodong Lin ; Mike P. Wittie

【Abstract】: Assessing multi-hop interpersonal trust in online social networks (OSNs) is critical for many social network applications such as online marketing but challenging due to the difficulties of handling complex OSN topology, in existing models such as subjective logic, and the lack of effective validation methods. To address these challenges, we for the first time properly define trust propagation and combination in arbitrary OSN topologies by proposing 3VSL (Three-Valued Subjective Logic). The 3VSL distinguishes the posteriori and priori uncertainties existing in trust, and the difference between distorting and original opinions, thus be able to compute multi-hop trusts in arbitrary graphs. We theoretically proved the capability based on the Dirichlet distribution. Furthermore, an online survey system is implemented to collect interpersonal trust data and validate the correctness and accuracy of 3VSL in real world. Both experimental and numerical results show that 3VSL is accurate in computing interpersonal trust in OSNs.

【Keywords】: social networking (online); telecommunication network topology; ternary logic; trusted computing; 3VSL; Dirichlet distribution; complex OSN topology; interpersonal trust data; multihop interpersonal trust assessment; online social networks; online survey system; three-valued subjective logic; trust combination; trust propagation; Computational modeling; Computers; Network topology; Social network services; Topology; Uncertainty; Vectors; Dirichlet distribution; Interpersonal trust; online social networks; three-valued subjective logic; trust establishment

191. FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics.

Paper Link】 【Pages】:1707-1715

【Authors】: Wenjun Jiang ; Jie Wu ; Guojun Wang ; Huanyang Zheng

【Abstract】: The goal of a trust-based recommendation system is to predict unknown ratings based on the ratings expressed by trusted friends. However, most of the existing work only considers the ratings at the current time slot. In real life, a user receives the influence of different opinions sequentially; accordingly, his opinion evolves over time. We propose a novel rating prediction scheme, FluidRating, which uses fluid dynamics theory to reveal the time-evolving formulation process of human opinions. The recommendation is modeled as fluid with two dimensions: the temperature is taken as the “opinion/rating,” and its volume is deemed as the “persistency,” representing how much one insists on his opinion. When new opinions come, each user refines his opinion through a round of fluid exchange with his neighbors. Opinions from multiple rounds are aggregated to gain a final prediction; both uniform and non-uniform aggregation are tested. Moreover, Three sampling approaches are proposed and examined. The experimental evaluation of a real data set validates the feasibility of the proposed model, and also demonstrates its effectiveness.

【Keywords】: fluid dynamics; recommender systems; trusted computing; FluidRating; fluid dynamics; fluid exchange; human opinions; nonuniform aggregation; rating prediction scheme; time-evolving formulation process; time-evolving rating scheme; trust-based recommendation systems; uniform aggregation; unknown ratings; Computational modeling; Computers; Conferences; Containers; Fluid dynamics; Temperature measurement; Time complexity; Fluid dynamics theory; rating prediction; time-evolving; trust-based recommendation system

SD: Software defined networking 4

192. On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks.

Paper Link】 【Pages】:1716-1724

【Authors】: Ulas C. Kozat ; Guanfeng Liang ; Koray Kokten

【Abstract】: Software Defined Networks (SDN) decouple the forwarding and control planes from each other. The control plane is assumed to have a global knowledge of the underlying physical and/or logical network topology so that it can monitor, abstract and control the forwarding plane. When parts of the control plane become unavailable or unreliable, individual controllers should still be able to monitor the forwarding plane and run diagnostics to take the correct routing actions. In our paper, we present solutions that install an optimal or near-optimal number of static forwarding rules on switches/routers for any controller to be able to verify the topology connectivity and detect/locate link failures at data plane speeds without relying on state updates from forwarding plane nodes and other controllers while requiring reachability to only one (arbitrary) forwarding node. Our upper bounds on performance indicate that sub-second link failure localization is possible even at data-center scale networks. For networks with hundreds or few thousand links, tens of milliseconds of latency is achievable.

【Keywords】: computer centres; computer network performance evaluation; telecommunication network routing; telecommunication network topology; telecommunication switching; SDN; control planes; data plane speeds; data-center scale networks; forwarding node; forwarding plane diagnosis; link failures; logical network topology; physical network topology; routers; routing actions; software defined networks; static forwarding rules; subsecond link failure localization; switches; topology connectivity; Bridges; Flyback transformers; IP networks; Network topology; Switches; Topology

193. Software Defined Monitoring of application protocols.

Paper Link】 【Pages】:1725-1733

【Authors】: Lukas Kekely ; Viktor Pus ; Jan Korenek

【Abstract】: Current high-speed network monitoring systems focus more and more on the data from the application layers. Flow data is usually enriched by the information from HTTP, DNS and other protocols. The increasing speed of the network links, together with the time consuming application protocol parsing, require a new way of hardware acceleration. Therefore we propose a new concept of hardware acceleration for flexible flow-based application level monitoring which we call Software Defined Monitoring (SDM). The concept relies on smart monitoring tasks implemented in the software in conjunction with a configurable hardware accelerator. The hardware accelerator is an application-specific processor tailored to stateful flow processing. The monitoring tasks reside in the software and can easily control the level of detail retained by the hardware for each flow. This way the measurement of bulk/uninteresting traffic is offloaded to the hardware while the advanced monitoring over the interesting traffic is performed in the software. The proposed concept allows one to create flexible monitoring systems capable of deep packet inspection at high throughput. Our pilot implementation in FPGA is able to perform a 100 Gb/s flow traffic measurement augmented by a selected application-level protocol parsing.

【Keywords】: field programmable gate arrays; protocols; telecommunication links; telecommunication traffic; DNS; FPGA; HTTP; application layers; application protocols; application-level protocol parsing; bit rate 100 Gbit/s; flow data; flow traffic measurement; hardware acceleration; hardware accelerator; high-speed network monitoring systems; network links; software defined monitoring; Acceleration; Computers; Conferences; Hardware; Monitoring; Protocols; Software

194. On the effect of forwarding table size on SDN network utilization.

Paper Link】 【Pages】:1734-1742

【Authors】: Rami Cohen ; Liane Lewin-Eytan ; Joseph Naor ; Danny Raz

【Abstract】: Software Defined Networks (SDNs) are becoming the leading technology behind many traffic engineering solutions, both for backbone and data-center networks, since it allows a central controller to globally plan the path of the flows according to the operator's objective. Nevertheless, networking devices' forwarding table is a limited and expensive resource (e.g., TCAM-based switches) which should thus be considered upon configuring the network. In this paper, we concentrate on satisfying global network objectives, such as maximum flow, in environments where the size of the forwarding table in network devices is limited. We formulate this problem as an (NP-hard) optimization problem and present approximation algorithms for it. We show through extensive simulations that practical use of our algorithms (both in Data Center and backbone scenarios) result in a significant reduction (factor 3) in forwarding table size, while having a small effect on the global objective (maximum flow).

【Keywords】: computational complexity; computer centres; optimisation; software radio; telecommunication computing; NP-hard optimization problem; SDN network utilization; TCAM-based switches; approximation algorithms; backbone networks; central controller; data-center networks; forwarding table size; global network objectives; maximum flow; network devices; operator objective; software defined networks; traffic engineering solutions; Approximation algorithms; Approximation methods; Computers; Conferences; Joining processes; Random variables; Routing

195. Software defined green data center network with exclusive routing.

Paper Link】 【Pages】:1743-1751

【Authors】: Dan Li ; Yunfei Shang ; Congjie Chen

【Abstract】: The explosive expansion of data center sizes aggravates the power consumption and carbon footprint, which has restricted the sustainable growth of cloud services and seriously troubled data center operators. In recent years, plenty of advanced data center network architectures have been proposed. They usually employ richly-connected topologies and multi-path routing to provide high network capacity. Unfortunately, they also undergo inefficient network energy usage during the traffic valley time. To address the problem, many energy-aware flow scheduling algorithms are proposed recently, primarily considering how to aggregate traffic by flexibly choosing the routing paths, with flows fairly sharing the link bandwidths. In this paper, we leverage software defined network (SDN) technique and explore a new solution to energy-aware flow scheduling, i.e., scheduling flows in the time dimension and using exclusive routing (EXR) for each flow, i.e., a flow always exclusively utilizes the links of its routing path. The key insight is that exclusive occupation of link resources usually results in higher link utilization in high-radix data center networks, since each flow does not need to compete for the link bandwidths with others. When scheduling the flows, EXR leaves flexibility to operators to define the priorities of flows, e.g., based on flow size, flow deadline, etc. Extensive simulations and testbed experiments both show that EXR can effectively save network energy compared with the regular fair-sharing routing (FSR), and significantly reduce the average flow completion time if assigning higher scheduling priorities to smaller flows.

【Keywords】: cloud computing; computer centres; computer networks; green computing; power aware computing; power consumption; scheduling; telecommunication network routing; EXR; FSR; SDN technique; carbon footprint; cloud services; energy-aware flow scheduling algorithms; exclusive routing; fair-sharing routing; power consumption; richly-connected topologies; software defined green data center network; sustainable growth; Bandwidth; Control systems; Energy consumption; Network topology; Ports (Computers); Routing; Servers

VN1: Vehicular Networks 1 4

196. Towards automatic phone-to-phone communication for vehicular networking applications.

Paper Link】 【Pages】:1752-1760

【Authors】: Shaohan Hu ; Hengchang Liu ; Lu Su ; Hongyan Wang ; Tarek F. Abdelzaher ; Pan Hui ; Wei Zheng ; Zhiheng Xie ; John A. Stankovic

【Abstract】: This paper explores direct phone-to-phone communication (via WiFi interface) among vehicles to support mobile sensing applications. Direct communication among drivers' phones is important in improving data collection efficiency and sharing participatory sensing information in an inexpensive manner. We design a practical and optimized communication mechanism for direct phone-to-phone data transfer among drivers' phones that strategically enables phone-to-phone and/or phone-to-WiFiAP communications by optimally toggles the phone between the normal client and the hotspot modes. We take advantage of the WiFi hotspot functionality on smartphones, and hence require neither involvement of participants nor changes to existing wireless infrastructure and protocols. An analytical model is established to optimize toggling between client and hotspot modes for optimal system efficiency. We fully implement this system on off-the-shelf Google Galaxy Nexus and Nexus S phones. Through a 35-vehicle 2-month deployment study, as well as simulation experiments using the real-world T-drive 9,211-taxicab dataset, we show that our solution significantly reduces data transfer delay time and maintains over 80% efficiency under varying system parameters. We even achieve 90% for parameter settings of the latest smartphones.

【Keywords】: mobile radio; protocols; smart phones; wireless LAN; WiFi hotspot functionality; WiFi interface; analytical model; automatic phone-to-phone communication; data collection efficiency; data transfer delay time reduction; direct phone-to-phone communication; direct phone-to-phone data transfer; driver phones; hotspot mode; mobile sensing application; off-the-shelf Google Galaxy Nexus S phones; optimal system efficiency; optimized communication mechanism; participatory sensing information; phone-to-WiFiAP communication; protocols; real-world T-drive taxicab dataset; smartphones; toggling optimization; vehicular networking application; wireless infrastructure; IEEE 802.11 Standards; Mobile communication; Sensors; Servers; Smart phones; Switches; Vehicles

197. POST: Exploiting dynamic sociality for mobile advertising in vehicular networks.

Paper Link】 【Pages】:1761-1769

【Authors】: Jun Qin ; Hongzi Zhu ; Yanmin Zhu ; Li Lu ; Guangtao Xue ; Minglu Li

【Abstract】: Mobile advertising in vehicular networks is of great interest with which timely information can be fast spread into the network. Given a limited budget for hiring seed vehicles, how to achieve the maximum advertising coverage within a given period of time is NP-hard. In this paper, we propose an innovative scheme, POST, for mobile advertising in vehicular networks. The POST design is based on two key observations we have found by analyzing three large-scale vehicle traces. First, vehicles demonstrate dynamic sociality in the network; second, such vehicular sociality has strong temporal correlations. With the knowledge, POST uses Markov chains to infer future vehicular sociality and adopts one greedy heuristic to select the most “centric” vehicles as seeds for mobile advertising. Extensive trace-driven simulation results show that POST can greatly improve the coverage and the intensity of advertising.

【Keywords】: Markov processes; advertising; greedy algorithms; mobile computing; vehicular ad hoc networks; Markov chains; POST; centric vehicles; dynamic sociality; greedy heuristic; innovative scheme; large-scale vehicle traces; maximum advertising coverage; mobile advertising; seed vehicle hiring; vehicular networks; vehicular sociality; Advertising; Measurement; Mobile communication; Mobile computing; Social network services; Vehicle dynamics; Vehicles; dynamic sociality; mobile advertising; social network analysis; vehicular networks

198. On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol.

Paper Link】 【Pages】:1770-1778

【Authors】: Hassan Aboubakr Omar ; Weihua Zhuang ; Li Li

【Abstract】: A vehicular ad hoc network (VANET) is an emerging technology which has a great potential in realizing a variety of new applications. This paper presents a new packet routing scheme which allows a vehicle to discover the existence of a gateway to the Internet and to send/receive packets to/from the gateway via multihop communications. The proposed routing scheme is based on a multichannel medium access control protocol, known as VeMAC [1], [2], using time division multiple access. The performance of this cross-layer design is evaluated for a multichannel VANET in terms of the end-to-end packet delay and the percentage of occupied time slots per frame in a highway scenario. Both packet queueing and service delays are considered in the end-to-end delay calculation by modeling each relay vehicle as a queueing system, in which the packets are served in batches of no more than a specified maximum batch-size.

【Keywords】: Internet; packet radio networks; queueing theory; routing protocols; time division multiple access; vehicular ad hoc networks; TDMA MAC protocol; VeMAC; end-to-end packet delay; gateway; in-vehicle Internet access; multichannel VANET; multichannel medium access control protocol; multihop communications; packet queueing; packet routing scheme; time division multiple access; vehicular ad hoc network; Delays; Economic indicators; Logic gates; Relays; Routing; Vehicles; Vehicular ad hoc networks

199. GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses.

Paper Link】 【Pages】:1779-1787

【Authors】: Lei Zhang ; Boyang Yu ; Jianping Pan

【Abstract】: Geocast, delivering messages to a specific location, has become an important issue with the accelerated development of the location-based services in mobile networks. Geocast in the automotive domain is of particular interest, enabling many promising applications, such as geographic advertising, location-based traffic alerts, etc. Different from the conventional geocast algorithms focusing on the distance-based approaches, in this paper, we propose a mobility-aware geocast algorithm (GeoMob) for urban VANETs from the Delay-Tolerant Network (DTN) perspective to better deal with the high mobility and transient connectivity issues. Different levels and aspects of vehicle mobility information are employed, making GeoMob very simple, scalable and communication and compunction-effective. Practical issues are well considered by introducing real-world trace analysis, trace-driven simulation and efficient buffer management. Extensive performance comparisons with other protocols have been conducted to show the advantages of GeoMob.

【Keywords】: delay tolerant networks; mobility management (mobile radio); telecommunication network routing; vehicular ad hoc networks; DTN; GeoMob; VANET; buffer management; delay tolerant network; location based services; mobile networks; mobility-aware geocast scheme; trace analysis; trace driven simulation; transient connectivity; vehicle mobility information; Cities and towns; Entropy; Global Positioning System; History; Microscopy; Routing; Vehicles; DTNs; Geocast; VANETs; mobility

CN4: Cellular networks 4 4

200. Automated dynamic offset applied to cell association.

Paper Link】 【Pages】:1788-1796

【Authors】: Majed Haddad ; Habib B. A. Sidi ; Piotr Wiecek ; Eitan Altman

【Abstract】: In this paper, we develop a hierarchical Bayesian game framework for automated dynamic offset selection. Users compete to maximize their throughput by picking the best locally serving radio access network (RAN) with respect to their own measurement, their demand and a partial statistical channel state information (CSI) of other users. In particular, we investigate the properties of a Stackelberg game, in which the base station is a player on its own. We derive analytically the utilities related to the channel quality perceived by users to obtain the equilibria. We study the Price of Anarchy (PoA) of such system, where the PoA is the ratio of the social welfare attained when a network planner chooses policies to maximize social welfare versus the social welfare attained in Nash/Stackeleberg equilibrium when users choose their policies strategically. We show by means of a Stackelberg formulation, how the operator, by sending appropriate information about the state of the channel, can configure a dynamic offset that optimizes its global utility while users maximize their individual utilities. The proposed hierarchical decision approach for wireless networks can reach a good trade-off between the global network performance at the equilibrium and the requested amount of signaling. Typically, it is shown that when the network goal is orthogonal to user's goal, this can lead the users to a misleading association problem.

【Keywords】: Bayes methods; distributed decision making; game theory; wireless LAN; Nash-Stackeleberg equilibrium; PoA; RAN; Stackelberg game; automated dynamic offset selection; base station; cell association; channel quality; global network performance; global utility; hierarchical Bayesian game framework; hierarchical decision approach; network planner; partial CSI; partial statistical channel state information; price of anarchy; radio access network; social welfare; wireless networks; Base stations; Computers; Conferences; Games; IEEE 802.11 Standards; Throughput; Wireless communication; 3G; Bayes-Nash equilibrium; Bayes-Stackelberg equilibrium; Price of Anarchy; WLAN; association problem; channel state information; game theory; misleading information

201. Interference coordination strategies for content update dissemination in LTE-A.

Paper Link】 【Pages】:1797-1805

【Authors】: Vincenzo Sciancalepore ; Vincenzo Mancuso ; Albert Banchs ; Shmuel Zaks ; Antonio Capone

【Abstract】: Opportunistic traffic offloading has been proposed to tackle overload problems in cellular networks. However, they only address the problem of deadline-based content propagation in the cellular system, given wireless environment characterization. In contrast, we cope with the traffic offloading issue from another perspective: the base station interference coordination problem. In particular, we aim at the minimization of the total transmission time spent by the base stations in order to inject contents into the network, and we leverage the recently proposed ABSF technique to keep under control intercell interference. We formulate an optimization problem, prove that it is NP-Complete, and propose a near-optimal heuristic. Our proposed algorithm substantially outperforms classical intercell interference approaches proposed in the literature, as we evaluate through the simulation of dense LTE-A network scenarios.

【Keywords】: Long Term Evolution; cellular radio; radiofrequency interference; telecommunication traffic; ABSF technique; LTE-A; base station interference coordination; cellular networks; cellular system; content update dissemination; deadline-based content propagation; intercell interference; interference coordination strategies; opportunistic traffic offloading; Approximation algorithms; Approximation methods; Base stations; Interference; Optimization; Schedules; Signal to noise ratio

202. Classifying call profiles in large-scale mobile traffic datasets.

Paper Link】 【Pages】:1806-1814

【Authors】: Diala Naboulsi ; Razvan Stanica ; Marco Fiore

【Abstract】: Cellular communications are undergoing significant evolutions in order to accommodate the load generated by increasingly pervasive smart mobile devices. Dynamic access network adaptation to customers' demands is one of the most promising paths taken by network operators. To that end, one must be able to process large amount of mobile traffic data and outline the network utilization in an automated manner. In this paper, we propose a framework to analyze broad sets of Call Detail Records (CDRs) so as to define categories of mobile call profiles and classify network usages accordingly. We evaluate our framework on a CDR dataset including more than 300 million calls recorded in an urban area over 5 months. We show how our approach allows to classify similar network usage profiles and to tell apart normal and outlying call behaviors.

【Keywords】: cellular radio; mobile computing; telecommunication traffic; call detail records; call profiles classification; cellular communication; dynamic access network adaptation; large-scale mobile traffic dataset; mobile access networks; pervasive smart mobile devices; Antennas; Base stations; Clustering algorithms; Indexes; Mobile communication; Mobile computing; Training

203. Cross-layer path management in multi-path transport protocol for mobile devices.

Paper Link】 【Pages】:1815-1823

【Authors】: Yeon-sup Lim ; Yung-Chih Chen ; Erich M. Nahum ; Don Towsley ; Kang-Won Lee

【Abstract】: MPTCP is a new transport protocol that enables mobile devices to use several physical paths simultaneously through multiple network interfaces, such as WiFi and cellular. However, wireless path characteristics change frequently in mobile environments, causing challenges for MPTCP: For example, WiFi associated paths often become unavailable as devices move, since WiFi has intermittent connectivity caused by the short signal range and susceptibility to interference. In this work, we improve MPTCP to manage path usage based on the associated link status. This variant, called MPTCP-MA, uses MAC-Layer information to locally estimate path quality and connectivity. By suspending/releasing paths based on their quality, MPTCP-MA can more effectively utilize restored paths. We have implemented and deployed MPTCP-MA in Linux and Android. Our experimental results show that MPTCP-MA can efficiently utilize an intermittently available path, with Wifi throughput improvements of up to 72 percent.

【Keywords】: Android (operating system); access protocols; cellular radio; mobile computing; multipath channels; radiofrequency interference; telecommunication network management; transport protocols; wireless LAN; Android; Linux; MAC-Layer information; MPTCP; MPTCP-MA; WiFi; cellular; cross-layer path management; interference susceptibility; intermittent connectivity estimation; mobile devices; multipath transport protocol; multiple network interfaces; path quality estimation; path usage management; physical paths; short signal range; wireless path characteristics; Conferences; Decision support systems; Estimation; Handheld computers; IEEE 802.11 Standards; Mobile communication

DC2: Data center networking 2 4

204. Practical DCB for improved data center networks.

Paper Link】 【Pages】:1824-1832

【Authors】: Brent Stephens ; Alan L. Cox ; Ankit Singla ; John B. Carter ; Colin Dixon ; Wes Felter

【Abstract】: Storage area networking is driving commodity data center switches to support lossless Ethernet (DCB). Unfortunately, to enable DCB for all traffic on arbitrary network topologies, we must address several problems that can arise in lossless networks, e.g., large buffering delays, unfairness, head of line blocking, and deadlock. We propose TCP-Bolt, a TCP variant that not only addresses the first three problems but reduces flow completion times by as much as 70%. We also introduce a simple, practical deadlock-free routing scheme that eliminates deadlock while achieving aggregate network throughput within 15% of ECMP routing. This small compromise in potential routing capacity is well worth the gains in flow completion time. We note that our results on deadlock-free routing are also of independent interest to the storage area networking community. Further, as our hardware testbed illustrates, these gains are achievable today, without hardware changes to switches or NICs.

【Keywords】: computer centres; local area networks; routing protocols; switching networks; telecommunication network topology; telecommunication traffic; transport protocols; DCB; ECMP routing; NIC; TCP-bolt; arbitrary network topology traffic; buffering delay; commodity data center switch; data center bridging; deadlock-free routing scheme; improved data center network; line blocking head; lossless Ethernet; storage area networking; Hardware; Ports (Computers); Routing; System recovery; Throughput; Topology; Vegetation

205. Distributed data storage systems with opportunistic repair.

Paper Link】 【Pages】:1833-1841

【Authors】: Vaneet Aggarwal ; Chao Tian ; Vinay A. Vaishampayan ; Yih-Farn Robin Chen

【Abstract】: The reliability of erasure-coded distributed storage systems, as measured by the mean time to data loss (MTTDL), depends on the repair bandwidth of the code. Repair-efficient codes provide reliability values several orders of magnitude better than conventional erasure codes. Current state of the art codes fix the number of helper nodes (nodes participating in repair) a priori. In practice, however, it is desirable to allow the number of helper nodes to be adaptively determined by the network traffic conditions. In this work, we propose an opportunistic repair framework to address this issue. It is shown that there exists a threshold on the storage overhead, below which such an opportunistic approach does not lose any efficiency from the optimal storage-repair-bandwidth tradeoff; i.e. it is possible to construct a code simultaneously optimal for different numbers of helper nodes. We further examine the benefits of such opportunistic codes, and derive the MTTDL improvement for two repair models: one with limited total repair bandwidth and the other with limited individual-node repair bandwidth. In both settings, we show orders of magnitude improvement in MTTDL. Finally, the proposed framework is examined in a network setting where a significant improvement in MTTDL is observed.

【Keywords】: storage area networks; storage management; telecommunication traffic; MTTDL; erasure-coded distributed data storage system reliability; helper nodes; limited individual-node repair bandwidth; limited total repair bandwidth; mean time-to-data loss; network traffic conditions; opportunistic codes; opportunistic repair framework; optimal storage-repair-bandwidth tradeoff; reliability values; repair models; repair-efficient codes; storage overhead; Bandwidth; Computers; Conferences; Loss measurement; Maintenance engineering; Peer-to-peer computing; Reliability

206. Let's stay together: Towards traffic aware virtual machine placement in data centers.

Paper Link】 【Pages】:1842-1850

【Authors】: Xin Li ; Jie Wu ; Shaojie Tang ; Sanglu Lu

【Abstract】: As tenants take networked virtual machines (VMs) as their requirements, effective placement of VMs is needed to reduce the network cost in cloud data centers. The cost is one of the major concerns for the cloud providers. In addition to the cost caused by network traffics (N-cost), the cost caused by the utilization of physical machines (PM-cost) is also non-negligible. In this paper, we focus on the optimized placement of VMs to minimize the cost, the combination of N-cost and PM-cost. We define N-cost by various functions, according to different communication models. We formulate the placement problem, and prove it to be NP-hard. We investigate the problem from two aspects. Firstly, we put a special emphasis on minimizing the N-cost with fixed PM-cost. For the case that tenants request the same amount of VMs, we present optimal algorithms under various definitions of N-cost. For the case that tenants require different numbers of VMs, we propose an approximation algorithm. Also, a greedy algorithm is implemented as the baseline to evaluate the performance. Secondly, we study the general case of the VM placement problem, in which both N-cost and PM-cost are taken into account. We present an effective binary-search-based algorithm to determine how many PMs should be used, which makes a tradeoff between PM-cost and N-cost. For all of the algorithms, we conduct theoretical analysis and extensive simulations to evaluate their performance and efficiency.

【Keywords】: approximation theory; cloud computing; computational complexity; computer centres; cost reduction; greedy algorithms; search problems; virtual machines; N-cost; NP-hard problem; PM-cost; VM; approximation algorithm; binary-search-based algorithm; cloud data centers; different communication models; greedy algorithm; network cost reduction; network traffic; networked virtual machines; optimal algorithms; physical machines; traffic aware virtual machine placement; Algorithm design and analysis; Approximation algorithms; Computers; Conferences; Cost function; Optimized production technology; Virtual machining; Clouds; cost optimization; data center; subset-sum problem; vector bin packing; virtual machine placement

207. On the design and analysis of Data Center Network architectures for interconnecting dual-port servers.

Paper Link】 【Pages】:1851-1859

【Authors】: Dawei Li ; Jie Wu

【Abstract】: We consider the design and analysis of Data Center Network (DCN) architectures for interconnecting dual-port servers. Unlike existing works, we propose the concept of Normalized Switch Delay (NSD) to distinguish a server-to-server-direct hop and a server-to-server-via-switch hop, to unify the design of DCN architectures. We then consider a fundamental problem: maximizing the number of dual-port servers, given network diameter and switch port number; and give an upper bound on this maximum number. Two novel architectures are proposed: SWCube and SWKautz, based on the generalized hypercube and Kautz graph, respectively, which in most cases accommodate more servers than BCN [1], which was claimed to be the largest known architecture. Compared with three existing architectures, SWCube and SWKautz demonstrate various advantages. Analysis and simulations also show that SWCube and SWKautz have nice properties for DCNs, such as low diameter, good fault-tolerance, and capability of efficiently handling network congestion.

【Keywords】: computer centres; hypercube networks; network servers; network theory (graphs); DCN architecture design; Kautz graph; NSD; SWCube; SWKautz; data center network architecture; dual port server interconnection; generalized hypercube; network diameter; normalized switch delay; server-to-server-direct hop; server-to-server-via-switch hop; switch port number; Delays; Hypercubes; Ports (Computers); Servers; Switches; Upper bound; Data center networks (DCNs); Kautz graphs; dual-port servers; generalized hypercubes

FT2: Fault tolerance and survivability 2 4

208. Signaling free localization of node failures in all-optical networks.

Paper Link】 【Pages】:1860-1868

【Authors】: János Tapolcai ; Lajos Rónyai ; Eva Hosszu ; Pin-Han Ho ; Suresh Subramaniam

【Abstract】: Network-wide local unambiguous failure localization (NL-UFL) [1] has been demonstrated as an interesting scenario of monitoring trails (m-trails). It attempts to enable every node to autonomously localize any failure event in the network in a distributed and all-optical manner by inspecting a set of m-trails traversing through the node. This paper investigates the m-trail allocation problem under the NL-UFL scenario by taking each link and node failure event into consideration. Bound analysis is performed using combinatorial group testing (CGT) theory and this is followed by the introduction of a novel heuristic on general topologies. Extensive simulation is conducted to examine the proposed heuristic in terms of the required cover length and the number of m-trails to achieve NL-UFL.

【Keywords】: combinatorial mathematics; computer network reliability; fault location; optical fibre networks; all optical networks; combinatorial group testing theory; m-trail allocation problem; network wide local unambiguous failure localization; node failure; signaling free node localization; trail monitoring; Computers; Conferences; Monitoring; Observatories; Resource management; Testing; Topology

209. Fault tolerant barrier coverage for wireless sensor networks.

Paper Link】 【Pages】:1869-1877

【Authors】: Zhibo Wang ; Honglong Chen ; Qing Cao ; Hairong Qi ; Zhi Wang

【Abstract】: Barrier coverage is a critical issue in wireless sensor networks for security applications (e.g., border protection), the performance of which is highly related with locations of sensor nodes. Existing work on barrier coverage mainly assume that sensor nodes have accurate location information, however, little work explores the effects of location errors on barrier coverage. In this paper, we study the barrier coverage problem when sensor nodes have location errors and deploy mobile sensor nodes to improve barrier coverage if the network is not barrier covered after initial deployment. We analyze the relationship between the true distance and the measured distance of two stationary sensor nodes and derive the minimum number of mobile sensor nodes needed to connect them with a guarantee when nodes location errors. Furthermore, we propose a fault tolerant weighted barrier graph, based on which we prove that the minimum number of mobile sensor nodes needed to form barrier coverage with a guarantee is the length of the shortest path on the graph. Simulation results validate the correctness of our analysis.

【Keywords】: fault tolerance; graph theory; wireless sensor networks; fault tolerant barrier coverage problem; fault tolerant weighted barrier graph; location errors; mobile sensor nodes; shortest path; stationary sensor nodes; wireless sensor networks; Fault tolerance; Fault tolerant systems; Measurement uncertainty; Mobile nodes; Robot sensing systems

210. Heterogeneity-aware data regeneration in distributed storage systems.

Paper Link】 【Pages】:1878-1886

【Authors】: Yan Wang ; Dongsheng Wei ; Xunrui Yin ; Xin Wang

【Abstract】: Distributed storage systems provide large-scale reliable data storage services by spreading redundancy across a large group of storage nodes. In such big systems, node failures take place on a regular basis. When a node fails or leaves the system, to maintain the same level of redundancy, it is expected to regenerate the redundant data at a replacement node as soon as possible. Previous studies aim to minimize the network traffic in the regeneration process, but in practical networks, where link capacities vary in a wide range, minimizing network traffic does not always mean minimizing regeneration time. Considering the heterogeneous link capacities, Li et al. proposed a tree-structured regeneration scheme, called RCTREE, to bypass the low-capacitated link encountered in direct transmissions. However, we find that RCTREE may rapidly lose data integrity after several regenerations. In this paper, we reconsider the problem of minimizing regeneration time in networks with heterogeneous link capacities. We derive the minimum amount of data to be transmitted through each link to preserve data integrity. We prove that building an optimal regeneration tree is NP-complete and propose a heuristic algorithm for a near-optimal solution. We further introduce a flexible regeneration scheme, which allows providers to generate different amount of coded data. Simulation results show that the flexible tree-structured regeneration scheme can reduce the regeneration time significantly.

【Keywords】: computer network reliability; data integrity; distributed processing; redundancy; storage area networks; storage management; telecommunication links; telecommunication traffic; trees (mathematics); NP-complete optimal regeneration tree; RCTREE; data integrity; distributed storage systems; flexible tree-structured regeneration scheme; heterogeneity-aware data regeneration; heterogeneous link capacities; heuristic algorithm; large-scale reliable data storage services; low-capacitated link; network traffic; node failures; redundant data regeneration; regeneration process; regeneration time minimization; storage nodes; Bandwidth; Conferences; Distributed databases; Maintenance engineering; Overlay networks; Peer-to-peer computing; Topology

211. CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems.

Paper Link】 【Pages】:1887-1895

【Authors】: Pengfei Chen ; Yong Qi ; Pengfei Zheng ; Di Hou

【Abstract】: Modern applications especially cloud-based or cloud-centric applications always have many components running in the large distributed environment with complex interactions. They are vulnerable to suffer from performance or availability problems due to the highly dynamic runtime environment such as resource hogs, configuration changes and software bugs. In order to make efficient software maintenance and provide some hints to software bugs, we build a system named CauseInfer, a low cost and blackbox cause inference system without instrumenting the application source code. CauseInfer can automatically construct a two layered hierarchical causality graph and infer the causes of performance problems along the causal paths in the graph with a series of statistical methods. According to the experimental evaluation in the controlled environment, we find out CauseInfer can achieve an average 80% precision and 85% recall in a list of top two causes to identify the root causes, higher than several state-of-the-art methods and a good scalability to scale up in the distributed systems.

【Keywords】: cloud computing; graph theory; program debugging; software maintenance; software performance evaluation; statistical analysis; CauseInfer; automatic performance diagnosis; availability problems; blackbox cause inference system; cloud-based applications; cloud-centric applications; distributed performance diagnosis; distributed systems; dynamic runtime environment; hierarchical causality graph; software bugs; software maintenance; statistical methods; Buildings; Computer bugs; Correlation; Measurement; Ports (Computers); Protocols; Software

SB2: Scheduling and buffer management 2 4

212. Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling.

Paper Link】 【Pages】:1896-1904

【Authors】: Florin Ciucu ; Felix Poloczek ; Jens B. Schmitt

【Abstract】: The practicality of the stochastic network calculus (SNC) is often questioned on grounds of potential looseness of its performance bounds. In this paper, it is uncovered that for bursty arrival processes (specifically Markov-Modulated On-Off (MMOO)), whose amenability to per-flow analysis is typically proclaimed as a highlight of SNC, the bounds can unfortunately be very loose (e.g., by several orders of magnitude off). In response to this uncovered weakness of SNC, the (Standard) per-flow bounds are herein improved by deriving a general sample-path bound, using martingale based techniques, which accommodates FIFO, SP, and EDF scheduling. The obtained (Martingale) bounds capture an extra exponential decay factor of O (e-αn) in the number of flows n. Moreover, numerical comparisons against simulations show that the Martingale bounds are not only remarkably accurate, but they also improve the Standard SNC bounds by factors as large as 100 or even 1000.

【Keywords】: calculus; scheduling; stochastic processes; EDF scheduling; FIFO; MMOO; Markov-Modulated On-Off; SNC; SP; bursty arrivals; general sample path bound; numerical comparisons; perflow analysis; sharp perflow delay bounds; stochastic network calculus; Bandwidth; Delays; Markov processes; Numerical models; Queueing analysis; Servers; Standards

213. LP-relaxation based distributed algorithms for scheduling in wireless networks.

Paper Link】 【Pages】:1905-1913

【Authors】: Chandramani Singh ; Angelia Nedic ; R. Srikant

【Abstract】: LP relaxations of Maximum Weighted Independent Set (MWIS) problems have been widely studied. A key motivation for this prior work comes from the central role that MWIS plays in designing throughput-optimal algorithms for wireless networks. However, to the best of our knowledge, the actual packet delay performance of these algorithms has not been studied in the context of wireless networks. In this paper, we first present an algorithm for solving the LP relaxation of MWIS which exhibits faster convergence to an optimal solution. Further, we show that one does not have to wait for infinite time for convergence to occur, but a simple rounding technique can be used to identify the ON/OFF states of the wireless links in finite time. As in prior work, such an approach only identifies the optimal MWIS states of some of the links in the network. Therefore, we present a scheme to combine this solution with Q-CSMA. Simulations indicate that the proposed scheme significantly improves the performance of Q-CSMA. Further, the proposed algorithm is shown to perform much better than previously suggested LP relaxation schemes due to its superior convergence properties.

【Keywords】: carrier sense multiple access; distributed algorithms; graph theory; linear programming; radio networks; LP-relaxation based distributed algorithms; MWIS; Q-CSMA; carrier sense multiple access protocols; conÀict graph; maximal scheduling; maximum weighted independent set problems; on-off state identification; rounding technique; throughput-optimal algorithms; wireless links; wireless networks; Delays; Heuristic algorithms; Multiaccess communication; Nickel; Schedules; Scheduling algorithms; Throughput

214. Low complexity multi-resource fair queueing with bounded delay.

Paper Link】 【Pages】:1914-1922

【Authors】: Wei Wang ; Ben Liang ; Baochun Li

【Abstract】: Middleboxes are ubiquitous in today's networks. They perform deep packet processing such as content-based filtering and transformation, which requires multiple categories of resources (e.g., CPU, memory bandwidth, and link bandwidth). Depending on the processing requirement of traffic, packet processing for different flows may consume vastly different amounts of resources. Multi-resource fair queueing allows flows to obtain a fair share of these resources, providing service isolation across flows. However, previous solutions for multi-resource fair queueing are either expensive to implement at high speeds, or incurring high scheduling delay for flows with uneven weights. In this paper, we present a new fair queueing algorithm, called Group Multi-Resource Round Robin (GMR3), that schedules packets in O(1) time, while achieving near-perfect fairness with a low scheduling delay bounded by a small constant. To our knowledge, it is the first provably fair, highly efficient multi-resource fair queueing algorithm with bounded delay.

【Keywords】: queueing theory; group multiresource round robin; high scheduling delay; low complexity multiresource fair queueing; middleboxes; near-perfect fairness; packet processing; service isolation; Algorithm design and analysis; Bandwidth; Complexity theory; Delays; Schedules; Scheduling; Scheduling algorithms

215. Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines.

Paper Link】 【Pages】:1923-1931

【Authors】: Shizhen Zhao ; Xiaojun Lin

【Abstract】: SVC-based live video-streaming in multi-channel wireless networks leads to a challenging joint rate-control and scheduling problem with stringent deadline constraints. Traditional utility-based approaches often did not explicitly account for deadlines. In this paper, we explicitly account for deadlines and study the problem of optimizing the total reward from packets meeting their deadlines in a modern 4G OFDM system. Motivated by a heuristic utility-based approach, we propose a class of threshold-based rate-control and wireless scheduling policies that can respect the deadline constraints and approach the optimal system reward asymptotically as the system size increases. We also propose a distributed realization of our threshold-based policies that can be easily implemented in practical scenarios. We substantiate the result via both analysis and simulation.

【Keywords】: 4G mobile communication; OFDM modulation; video coding; video streaming; SVC-based live video-streaming; heuristic utility-based approach; joint rate-control and scheduling problem; modern 4G OFDM system; multichannel scheduling; multichannel wireless networks; stringent deadlines; threshold-based rate-control; wireless live streaming; Base stations; Joints; OFDM; Static VAr compensators; Streaming media; Upper bound; Wireless communication

SC2: Social computing and networks 2 4

216. Information diffusion in mobile social networks: The speed perspective.

Paper Link】 【Pages】:1932-1940

【Authors】: Zongqing Lu ; Yonggang Wen ; Guohong Cao

【Abstract】: The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the problem of identifying a small number of individuals through whom the information can be diffused to the network as soon as possible, referred to as the diffusion minimization problem. Diffusion minimization under the probabilistic diffusion model can be formulated as an asymmetric k-center problem which is NP-hard, and the best known approximation algorithm for the asymmetric k-center problem has approximation ratio of log* n and time complexity O(n5). Clearly, the performance and the time complexity of the approximation algorithm are not satisfiable in large-scale mobile social networks. To deal with this problem, we propose a community based algorithm and a distributed set-cover algorithm. The performance of the proposed algorithms is evaluated by extensive experiments on both synthetic networks and a real trace. The results show that the community based algorithm has the best performance in both synthetic networks and the real trace, and the distributed setcover algorithm outperforms the approximation algorithm in the real trace in terms of diffusion time.

【Keywords】: approximation theory; computational complexity; marketing; mobile computing; social networking (online); NP-hard problem; approximation algorithm; asymmetric k-center problem; information diffusion; mobile social networks; probabilistic diffusion model; time complexity; viral marketing; Algorithm design and analysis; Approximation algorithms; Approximation methods; Communities; Mobile communication; Mobile computing; Social network services

217. Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach.

Paper Link】 【Pages】:1941-1949

【Authors】: Zhong Li ; Cheng Wang ; Siqian Yang ; Changjun Jiang ; Ivan Stojmenovic

【Abstract】: In this paper, we study two tightly coupled issues: space-crossing community detection and its influence on data forwarding in Mobile Social Networks (MSNs) by taking the hybrid underlying networks with infrastructure support into consideration. The hybrid underlying network is composed of large numbers of mobile users and a small portion of Access Points (APs). Because APs can facilitate the communication among long-distance nodes, the concept of physical proximity community can be extended to be one across the geographical space. In this work, we first investigate a space-crossing community detection method for MSNs. Based on the detection results, we design a novel data forwarding algorithm SAAS (Social Attraction and AP Spreading), and show how to exploit the space-crossing communities to improve the data forwarding efficiency. We evaluate our SAAS algorithm on real-life data from MIT Reality Mining and University of Illinois Movement (UIM). Results show that space-crossing community plays a positive role in data forwarding in MSNs in terms of delivery ratio and delay. Based on this new type of community, SAAS achieves a better performance than existing social community-based data forwarding algorithms in practice, including Bubble Rap and Nguyen's Routing algorithms.

【Keywords】: human factors; mobile computing; social networking (online); AP spreading; Bubble Rap algorithms; MIT reality mining; MSN; Nguyens routing algorithms; SAAS algorithm; University of Illinois Movement; access points; hybrid underlying networks; infrastructure support; long-distance node communication; mobile social networks; mobile users; physical proximity community; social attraction; social community-based data forwarding algorithms; space-crossing communities; space-crossing community detection approach; Communities; Educational institutions; Local activities; Mobile communication; Mobile computing; Social network services; Vectors

218. Optimizing offline access to social network content on mobile devices.

Paper Link】 【Pages】:1950-1958

【Authors】: Ngoc Minh Do ; Ye Zhao ; Shu-Ting Wang ; Cheng-Hsin Hsu ; Nalini Venkatasubramanian

【Abstract】: In this paper, we explore the problem of supporting efficient access to social media contents on social network sites for mobile devices without requiring mobile users to be online all the time. We propose and implement a broker/proxy based architecture that stages data at a broker/proxy, and selectively downloads to the mobile device only those contents that have a high likelihood of being viewed. The system determines the relevance of social media updates that continuously arrive (e.g., Facebook friend updates) for each user. Using knowledge of this relevance and current network/system conditions, we develop scheduling algorithms that determine which social contents are sent to the devices. We develop an Android app providing offline access to Facebook. Our experimental results indicate that our system is energy efficient, which saves energy by 6.9 times for WiFi and 9.1 times for cellular connections. We also use data traces gathered from our app to further drive extensive simulation based evaluations which show that our proposed algorithms provide efficient facilities for tuning the system's performance.

【Keywords】: Android (operating system); mobile computing; optimisation; scheduling; social networking (online); wireless LAN; Android app; Facebook; WiFi; broker-proxy based architecture; cellular connections; data traces; mobile devices; network-system conditions; offline access optimization; scheduling algorithms; social media updates; social network content; social network sites; Media; Mobile communication; Mobile computing; Mobile handsets; Prefetching; Scheduling algorithms; Social network services; Social networks; energy consumption; mobile devices; offline access; optimization

219. A social group utility maximization framework with applications in database assisted spectrum access.

Paper Link】 【Pages】:1959-1967

【Authors】: Xu Chen ; Xiaowen Gong ; Lei Yang ; Junshan Zhang

【Abstract】: In this paper, we develop a social group utility maximization (SGUM) framework for cooperative networking that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing its individual utility or the overall network utility, each user aims to maximize its social group utility that hinges heavily on its social ties with other users. We show that this framework provides rich modeling flexibility and spans the continuum space between non-cooperative game and network utility maximization (NUM) - two traditionally disjoint paradigms for network optimization. Based on this framework, we study an important application in database assisted spectrum access. We formulate the distributed spectrum access problem among white-space users with social ties as a SGUM game. We show that the game is a potential game and always admits a social-aware Nash equilibrium. We also design a distributed spectrum access algorithm that can achieve the social-aware Nash equilibrium of the game and quantify its performance gap. We evaluate the performance of the SGUM solution using real social data traces. Numerical results demonstrate that the performance gap between the SGUM solution and the NUM (social welfare optimal) solution is at most 15%.

【Keywords】: computer networks; distributed algorithms; game theory; information services; social networking (online); NUM; SGUM framework; continuum space; cooperative networking; database assisted spectrum access; distributed spectrum access algorithm; network optimization; network utility maximization; networking coupling; noncooperative game; performance gap; real social data traces; rich modeling flexibility; social group utility maximization framework; social relationships; social ties; social welfare optimal; social-aware Nash equilibrium; white-space users; Algorithm design and analysis; Couplings; Databases; Games; Interference; Manganese; Nash equilibrium

VN2: Vehicular networks 2 4

220. A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves.

Paper Link】 【Pages】:1968-1976

【Authors】: Markus Forster ; Raphael Frank ; Mario Gerla ; Thomas Engel

【Abstract】: We address the problem of shock wave formation in uncoordinated highway traffic. First, we identify the combination of heavy traffic and small traffic perturbations or unexpected driver actions as the main causes of highway traffic jams. Then we introduce a novel distributed communication protocol that enables us to eliminate upstream shock wave formation even with low system penetration rates. Based on traffic information ahead, we propose a Cooperative Advanced Driver Assistance System (CADAS) that recommends non-intuitive velocity reductions in order to redistribute traffic more uniformly thereby eliminating traffic peaks. Simulation results show that CADAS significantly increases the average velocity and therewith reduces the overall travel time and avoids unnecessary slowdowns.

【Keywords】: cooperative systems; driver information systems; perturbation techniques; protocols; road traffic; road vehicles; shock waves; CADAS; cooperative advanced driver assistance system; distributed communication protocol; heavy traffic perturbation; highway traffic jam; nonintuitive velocity reduction; small traffic perturbation; system penetration rate; traffic information; traffic peak; uncoordinated highway traffic; upstream shock wave formation; vehicular traffic shock waves; Equations; Mathematical model; Protocols; Roads; Shock waves; Vehicles; Congested Flow; Shock Waves; Traffic Modeling; Vehicular Networks

221. Data-driven traffic flow analysis for vehicular communications.

Paper Link】 【Pages】:1977-1985

【Authors】: Yang Wang ; Liusheng Huang ; Tianbo Gu ; Hao Wei ; Kai Xing ; Junshan Zhang

【Abstract】: Due to high mobility and frequent disconnections in a vehicular network, reliable and efficient vehicular communication is very challenging. Previous studies focus on predicting the trajectories of single vehicles. Due to many random factors, however, there is little regularity in the movements of a single vehicle in an urban area, and this motivates us to take a holistic network perspective. With this insight, we model the time varying regularities of road traffic flows in road segments and intersections by mining statistic trajectories of all vehicles in the network. Based on these regularities and local real-time traffic information, we propose a new method to calculate the expected transfer delay from a current position to a given destination. We also propose a method to collect updated destination information. By combining the above two methods, we design a routing algorithm for vehicle-to-vehicle data transmission in vehicular networks, and then prove that it is a linear-time algorithm. Finally, we evaluate our algorithm by using information of real taxi vehicles. The results show that the performance of our algorithm is significantly better than other solutions in terms of packet delay.

【Keywords】: mobile radio; road traffic; telecommunication network reliability; telecommunication network routing; data-driven traffic flow analysis; holistic network perspective; linear-time algorithm; local real-time traffic information; packet delay; real taxi vehicle information; road intersections; road segments; road traffic flows; routing algorithm; statistic trajectory mining; time-varying regularity; transfer delay; updated destination information; urban area; vehicle trajectory prediction; vehicle-to-vehicle data transmission; vehicular communication efficiency; vehicular communication reliability; vehicular network disconnection; vehicular network mobility; Algorithm design and analysis; Delays; Equations; Prediction algorithms; Roads; Trajectory; Vehicles

222. CityDrive: A map-generating and speed-optimizing driving system.

Paper Link】 【Pages】:1986-1994

【Authors】: Yiran Zhao ; Yang Zhang ; Tuo Yu ; Tianyuan Liu ; Xinbing Wang ; Xiaohua Tian ; Xue Liu

【Abstract】: There have been many traffic light control systems around the globe, but the high cost of infrastructure and maintenance hinders their wide deployment. However, speed-advisory systems enabled by on-vehicle devices are much cheaper and easier to deploy. The first challenge of such systems is to get the traffic signal schedule in complex intersections. The second challenge is to get map information and calculate the distance. Facing these challenges we devise and implement a speed-advisory driving system called CityDrive, which harnesses the sensor and GPS data from a wide participation of smartphones to suggest proper speed for drivers so that they arrive at intersections in green phase. CityDrive first generates a road map and then infers traffic signal schedules, using only smartphones and a server. CityDrive does not eliminate stops at intersections, but it tries to maximize the probability that vehicles cruise through intersections in green phase. Both simulation and real test show that this continuous speed advisory service effectively smoothes traffic flow and significantly reduces energy consumption.

【Keywords】: Global Positioning System; driver information systems; probability; road traffic control; smart phones; CityDrive; GPS data; map-generating driving system; on-vehicle devices; probability; smartphones; speed-advisory systems; speed-optimizing driving system; traffic light control systems; Acceleration; Global Positioning System; Roads; Servers; Silicon; Smart phones; Vehicles

223. ForeSight: Mapping vehicles in visual domain and electronic domain.

Paper Link】 【Pages】:1995-2003

【Authors】: Dong Li ; Zhixue Lu ; Tarun Bansal ; Erik Schilling ; Prasun Sinha

【Abstract】: Using broadcast in vehicular applications such as autonomous cruise control and collaborative driving can disturb unrelated drivers and fail to convey the message due to unspecified receiver, resulting in increased risk of accidents. For supporting the unicast communication primitive, it is important to know the electronic identities (EIDs), e.g., the IP addresses and the relative positions of the nearby vehicles. We show that the estimated GPS coordinates alone are not accurate enough to uniquely identify the intended vehicle. On the other hand, there is an increasing array of devices, such as on-board camera, RADAR, and DSRC radio that are becoming available in newer vehicles. These heterogeneously deployed devices provide information sources that have varying levels of accuracy and potentially different coverage regions, making it challenging to accurately identify the vehicle. As a first step, we design ForeSight, a system that dynamically integrates the information observed in the visual domain (e.g., from camera) and the electronic domain (e.g., WiFi radio) to match the vehicles observed in these two domains with high accuracy. The experiment and simulation results show that ForeSight is able to significantly improve the vehicle identification accuracy compared to using GPS or other algorithms. In our case study, ForeSight reduces disturbing messages by 14 × as compared to the number of a GPS-based communication method.

【Keywords】: mobile radio; road accidents; DSRC radio; EIDs; ForeSight; GPS-based communication method; IP addresses; autonomous cruise control; collaborative driving; electronic domain; electronic identities; estimated GPS coordinates; information sources; on-board camera; radar; unicast communication primitive; vehicle identification accuracy; vehicle mapping; visual domain; Accuracy; Cameras; Clustering algorithms; Global Positioning System; Image color analysis; Vehicles; Visualization

DB: Big Data 4

224. Online load balancing for MapReduce with skewed data input.

Paper Link】 【Pages】:2004-2012

【Authors】: Yanfang Le ; Jiangchuan Liu ; Funda Ergün ; Dan Wang

【Abstract】: MapReduce has emerged as a powerful tool for distributed and scalable processing of voluminous data. In this paper, we, for the first time, examine the problem of accommodating data skew in MapReduce with online operations. Different from earlier heuristics in the very late reduce stage or after seeing all the data, we address the skew from the beginning of data input, and make no assumption about a priori knowledge of the data distribution nor require synchronized operations. We examine the input in a continuous fashion and adaptively assign tasks with a load-balanced strategy. We show that the optimal strategy is a constrained version of online minimum makespan and, in the MapReduce context where pairs with identical keys must be scheduled to the same machine, there is an online algorithm with a provable 2-competitive ratio. We further suggest a sample-based enhancement, which, probabilistically, achieves a 3/2-competitive ratio with a bounded error.

【Keywords】: distributed processing; resource allocation; MapReduce; bounded error; data distribution; load-balanced strategy; online load balancing; online minimum makespan; online operations; provable 2-competitive ratio; sample-based enhancement; skewed data input; voluminous data; Computational modeling; Computers; Conferences; Distributed databases; Educational institutions; Frequency estimation; Load management

225. Enabling efficient access control with dynamic policy updating for big data in the cloud.

Paper Link】 【Pages】:2013-2021

【Authors】: Kan Yang ; Xiaohua Jia ; Kui Ren ; Ruitao Xie ; Liusheng Huang

【Abstract】: Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, because the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method incurs a high communication overhead and heavy computation burden on data owners. In this paper, we propose a novel scheme that enabling efficient access control with dynamic policy updating for big data in the cloud. We focus on developing an outsourced policy updating method for ABE systems. Our method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Moreover, we also design policy updating algorithms for different types of access policies. The analysis show that our scheme is correct, complete, secure and efficient.

【Keywords】: Big Data; authorisation; cloud computing; cryptography; ABE; Big Data; access control; access policy; attribute-based encryption; cloud; dynamic policy updating; end-to-end security; outsourced policy updating method; Access control; Big data; Encryption; Public key; Servers; ABE; Access Control; Big Data; Cloud; Policy Updating

226. Online algorithms for uploading deferrable big data to the cloud.

Paper Link】 【Pages】:2022-2030

【Authors】: Linquan Zhang ; Zongpeng Li ; Chuan Wu ; Minghua Chen

【Abstract】: This work studies how to minimize the bandwidth cost for uploading deferral big data to a cloud computing platform, for processing by a MapReduce framework, assuming the Internet service provider (ISP) adopts the MAX contract pricing scheme. We first analyze the single ISP case and then generalize to the MapReduce framework over a cloud platform. In the former, we design a Heuristic Smoothing algorithm whose worst-case competitive ratio is proved to fall between 2-1/(D+1) and 2(1 - 1/e), where D is the maximum tolerable delay. In the latter, we employ the Heuristic Smoothing algorithm as a building block, and design an efficient distributed randomized online algorithm, achieving a constant expected competitive ratio. The Heuristic Smoothing algorithm is shown to outperform the best known algorithm in the literature through both theoretical analysis and empirical studies. The efficacy of the randomized online algorithm is also verified through simulation studies.

【Keywords】: Big Data; Internet; cloud computing; distributed algorithms; distributed programming; ISP; Internet service provider; MAX contract pricing scheme; MapReduce framework; cloud computing platform; constant expected competitive ratio; deferrable Big Data uploading; distributed randomized online algorithm; heuristic smoothing algorithm; maximum tolerable delay; worst-case competitive ratio; Algorithm design and analysis; Cloud computing; Data models; Delays; Heuristic algorithms; Minimization; Smoothing methods

227. TideWatch: Fingerprinting the cyclicality of big data workloads.

Paper Link】 【Pages】:2031-2039

【Authors】: Dan Williams ; Shuai Zheng ; Xiangliang Zhang ; Hani Jamjoom

【Abstract】: Intrinsic to “big data” processing workloads (e.g., iterative MapReduce, Pregel, etc.) are cyclical resource utilization patterns that are highly synchronized across different resource types as well as the workers in a cluster. In Infrastructure as a Service settings, cloud providers do not exploit this characteristic to better manage VMs because they view VMs as “black boxes.” We present TideWatch, a system that automatically identifies cyclicality and similarity in running VMs. TideWatch predicts period lengths of most VMs in Hadoop workloads within 9% of actual iteration boundaries and successfully classifies up to 95% of running VMs as participating in the appropriate Hadoop cluster. Furthermore, we show how TideWatch can be used to improve the timing of VM migrations, reducing both migration time and network impact by over 50% when compared to a random approach.

【Keywords】: cloud computing; data handling; iterative methods; resource allocation; virtual machines; Hadoop cluster; TideWatch; VM; big data processing workloads; big data workload cyclicality; black boxes; cloud providers; cyclical resource utilization; cyclical resource utilization patterns; infrastructure as a service settings; iteration boundaries; Computers; Conferences; Noise; Resource management; Smoothing methods; Synchronization; Time series analysis

CNB: Content/name based networking 4

228. A unified approach to the performance analysis of caching systems.

Paper Link】 【Pages】:2040-2048

【Authors】: Valentina Martina ; Michele Garetto ; Emilio Leonardi

【Abstract】: We propose a unified methodology to analyse the performance of caches (both isolated and interconnected), by extending and generalizing a decoupling technique originally known as Che's approximation, which provides very accurate results at low computational cost. We consider several caching policies, taking into account the effects of temporal locality. In the case of interconnected caches, our approach allows us to do better than the Poisson approximation commonly adopted in prior work. Our results, validated against simulations and trace-driven experiments, provide interesting insights into the performance of caching systems.

【Keywords】: cache storage; Che approximation; Poisson approximation; caching policies; caching systems; decoupling technique; interconnected cache; isolated cache; performance analysis; temporal locality; unified approach; Analytical models; Approximation methods; Computational efficiency; Computational modeling; Computers; Conferences; Standards

229. Scalable Pending Interest Table design: From principles to practice.

Paper Link】 【Pages】:2049-2057

【Authors】: Haowei Yuan ; Patrick Crowley

【Abstract】: A Pending Interest Table (PIT) is a core component in Named Data Networking. Scalable PIT design is challenging because it requires per-packet updates, and the names stored in the PIT are long, requiring more memory. As the line speed keeps increasing, e.g., 100 Gbps, traditional hash-table based methods cannot meet these requirements. In this paper, we propose a novel Pending Interest Table design that guarantees packet delivery with a compact and approximate storage representation. To achieve this, the PIT stores fixed-length fingerprints instead of name strings. To overcome the classical fingerprint collision problem, the Interest aggregation feature in the core routers is relaxed. The memory requirement and network traffic overhead are analyzed, and the performance of a software implementation of the proposed design is measured. Our results show that 37 MiB to 245 MiB are required at 100 Gbps, so that the PIT can fit into SRAM or RLDRAM chips.

【Keywords】: computer networks; approximate storage representation; classical fingerprint collision problem; computer networks; fixed length fingerprints; hash table; memory requirement; named data networking; packet delivery; pending interest table design; scalable PIT design; scalable pending interest table design; software implementation; Computers; Conferences; Face; Fingerprint recognition; Memory management; Random access memory

230. REIN: A fast event matching approach for content-based publish/subscribe systems.

Paper Link】 【Pages】:2058-2066

【Authors】: Shiyou Qian ; Jian Cao ; Yanmin Zhu ; Minglu Li

【Abstract】: Event matching is the process of checking high volumes of events against large numbers of subscriptions and is a fundamental issue for the overall performance of a large-scale distributed publish/subscribe system. Most existing algorithms are based on counting satisfied component constraints in each subscription. As the scale of a system grows, these algorithms inevitably suffer from performance degradation. We present REIN (REctangle INtersection), a fast event matching approach for large-scale content-based publish/subscribe systems. The idea behind REIN is to quickly filter out unlikely matched subscriptions. In REIN, the event matching problem is first transformed into the rectangle intersection problem. Then, an efficient index structure is designed to address the problem by using bit operations. Experimental results show that REIN has a better matching performance than its counterparts. In particular, the event matching speed is faster by an order of magnitude when the selectivity of subscriptions is high and the number of subscriptions is large.

【Keywords】: data structures; message passing; middleware; REIN approach; bit operations; content-based publish-subscribe systems; distributed publish-subscribe system; fast event matching approach; index structure; rectangle intersection algorithm; rectangle intersection problem; Computers; Conferences; Educational institutions; Indexes; Merging; Routing; Subscriptions

231. Reducing forwarding state in content-centric networks with semi-stateless forwarding.

Paper Link】 【Pages】:2067-2075

【Authors】: Christos Tsilopoulos ; George Xylomenos ; Yannis Thomas

【Abstract】: Routers in the Content-Centric Networking (CCN) architecture maintain state for all pending content requests, so as to be able to later return the corresponding content. By employing stateful forwarding, CCN supports native multicast, enhances security and enables adaptive forwarding, at the cost of excessive forwarding state that raises scalability concerns. We propose a semi-stateless forwarding scheme in which, instead of tracking each request at every on-path router, requests are tracked at every d hops. At intermediate hops, requests gather reverse path information, which is later used to deliver responses between routers using Bloom filter-based stateless forwarding. Our approach effectively reduces forwarding state, while preserving the advantages of CCN forwarding. Evaluation results over realistic ISP topologies show that our approach reduces forwarding state by 54%-70% in unicast delivery, without any bandwidth penalties, while in multicast delivery it reduces forwarding state by 34%-55% at the expense of 6%-13% in bandwidth overhead.

【Keywords】: computer networks; data structures; topology; Bloom filter-based stateless forwarding; CCN architecture; ISP topologies; adaptive forwarding; content-centric networking architecture; semi-stateless forwarding scheme; unicast delivery; Bandwidth; Computer architecture; Computers; Conferences; Ports (Computers); Probabilistic logic; Unicast

CR1: Cognitive radio networks 1 4

232. A unified framework for wireless max-min utility optimization with general monotonic constraints.

Paper Link】 【Pages】:2076-2084

【Authors】: Yao-Win Peter Hong ; Chee Wei Tan ; Liang Zheng ; Cheng-Lin Hsieh ; Chia-Han Lee

【Abstract】: This paper presents a unifying and systematic framework to solve wireless max-min utility fairness optimization problems in multiuser wireless networks with generalized monotonic constraints. These problems are often challenging to solve due to their nonlinearity and non-convexity. Our framework leverages a general result in nonlinear Perron-Frobenius theory to characterize the global optimal solution of these problems analytically, and to design scalable and fast-convergent algorithms for the computation of the optimal solution. This work advances the state-of-the-art in handling wireless utility optimization problems with nonlinear monotonic constraints, which existing methodologies cannot handle, and also unifies previous works in this area. Several representative applications are considered to illustrate the effectiveness of the proposed framework, including max-min quality of service subject to robust interference temperature constraints in cognitive radio networks, min-max outage subject to outage constraints in heterogeneous networks, and min-max weighted MSE subject to SINR constraints in multiuser downlink system.

【Keywords】: cognitive radio; minimax techniques; multi-access systems; cognitive radio; general monotonic constraints; generalized monotonic constraint; min-max outage; multiuser wireless networks; nonlinear Perron-Frobenius theory; nonlinear monotonic constraint; unified framework; utility fairness optimization problem; wireless max-min utility optimization; wireless utility optimization problems; Interference; Receivers; Signal to noise ratio; Standards; Vectors; Wireless networks

233. A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks.

Paper Link】 【Pages】:2085-2093

【Authors】: Xingya Liu ; Jiang Xie

【Abstract】: In cognitive radio ad-hoc networks, two users rendezvous on a common available channel to realize communications. Most existing rendezvous papers focus on success-guaranteed channel-hopping sequence design. However, the theoretical rendezvous successful rate may suffer from the available channel status changing, collisions on channels, congestion at users, and target users unavailability in practical scenarios. Thus, a practical rendezvous framework that can address these issues is highly demanded. In this paper, we develop analytical models for each possible factor which may influence the performance of rendezvous. Then, based on the analysis of each factor, we propose corresponding schemes and integrate them into a self-adaptive protocol which can adjust its reaction and optimize system parameters to adapt to the dynamic network. Simulation results demonstrate that our proposed protocol gains better performance in terms of true rendezvous successful rate, short rendezvous delay, and low congestion. To the best of our knowledge, this is the first rendezvous protocol that addresses practical issues in realistic communication scenarios in cognitive radio networks.

【Keywords】: ad hoc networks; cognitive radio; protocols; cognitive radio ad hoc networks; dynamic network; practical self-adaptive rendezvous protocol; short rendezvous delay; success-guaranteed channel-hopping sequence design; true rendezvous successful rate; Cognitive radio; Computers; Data communication; Delays; Protocols; Receivers; Sensors

234. Delay-constrained caching in cognitive radio networks.

Paper Link】 【Pages】:2094-2102

【Authors】: Jing Zhao ; Wei Gao ; Yi Wang ; Guohong Cao

【Abstract】: In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve substantial performance improvement. To avoid interference with licensed users, unlicensed users must vacate the spectrum when it is accessed by licensed (primary) users. Since it takes some time for unlicensed users to switch to other available channels, the ongoing data transmissions may have to be interrupted and the transmission delay can be significantly increased. This makes it hard for cognitive radio networks to meet the delay constraints of many applications. To the best of our knowledge, we are the first to use caching techniques to address this problem. We formulate the cache placement problem in cognitive radio networks as an optimization problem, where the goal is to minimize the total cost, subject to some delay constraint, i.e., the data access delay can be statistically bounded. To solve this problem, we propose three approaches: cost-based, delay-based, and hybrid. Simulation results show that our approaches outperform existing caching solutions in terms of total cost and delay constraint, and the hybrid approach performs the best among the approaches satisfying the delay constraint.

【Keywords】: cache storage; cognitive radio; data communication; delays; multi-access systems; optimisation; radio spectrum management; cache placement problem; caching techniques; cognitive radio networks; cost-based approach; data access delay; data transmissions; delay-based approach; delay-constrained caching; hybrid approach; optimization problem; primary users; transmission delay; under-utilized licensed spectrum; unlicensed users; Cognitive radio; Conferences; Data communication; Delays; Generators; Markov processes; Switches

235. Probability distribution of spectral hole duration in cognitive networks.

Paper Link】 【Pages】:2103-2111

【Authors】: Jelena V. Misic ; Vojislav B. Misic

【Abstract】: Operation of cognitive secondary networks is critically dependent on the activity patterns of primary users. In this paper, we investigate the probability distribution of spectral holes, assuming that active and idle periods of primary users are independent random variables (which need not be identically distributed). We consider black, white, and gray holes, which correspond to time intervals when all channels are busy, all channels are idle, and some channels are busy while others are idle, respectively. We show that the duration of black and white holes may be described using an exponential approximation which holds regardless of the actual probability distribution of channel active and idle times, as long as the number of channels is not too small. The time interval between successive black hole occurrences is shown to be exponentially distributed as well. We also analyze the behavior of gray holes and quantify their impact using a simple proxy measure.

【Keywords】: approximation theory; cognitive radio; probability; black hole occurrence; cognitive secondary networks; exponential approximation; probability distribution; spectral hole duration; Approximation methods; Computers; Conferences; Exponential distribution; Probability density function; Random variables

CS: Cloud security and privacy 3

Paper Link】 【Pages】:2112-2120

【Authors】: Bing Wang ; Shucheng Yu ; Wenjing Lou ; Y. Thomas Hou

【Abstract】: Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of encrypted data outsourced to the cloud. Existing solutions provide multi-keyword exact search that does not tolerate keyword spelling error, or single keyword fuzzy search that tolerates typos to certain extent. The current fuzzy search schemes rely on building an expanded index that covers possible keyword misspelling, which lead to significantly larger index file size and higher search complexity. In this paper, we propose a novel multi-keyword fuzzy search scheme by exploiting the locality-sensitive hashing technique. Our proposed scheme achieves fuzzy matching through algorithmic design rather than expanding the index file. It also eliminates the need of a predefined dictionary and effectively supports multiple keyword fuzzy search without increasing the index or search complexity. Extensive analysis and experiments on real-world data show that our proposed scheme is secure, efficient and accurate. To the best of our knowledge, this is the first work that achieves multi-keyword fuzzy search over encrypted cloud data.

【Keywords】: cloud computing; computational complexity; cryptography; data privacy; database indexing; file organisation; fuzzy set theory; search problems; algorithmic design; encrypted cloud data; fuzzy matching; index file size; locality-sensitive hashing technique; predefined dictionary; privacy-preserving multikeyword fuzzy search; search complexity; Cryptography; Indexes; Keyword search; Privacy; Servers; Vectors

237. Efficient public integrity checking for cloud data sharing with multi-user modification.

Paper Link】 【Pages】:2121-2129

【Authors】: Jiawei Yuan ; Shucheng Yu

【Abstract】: In past years a body of data integrity checking techniques have been proposed for securing cloud data services. Most of these works assume that only the data owner can modify cloud-stored data. Recently a few attempts started considering more realistic scenarios by allowing multiple cloud users to modify data with integrity assurance. However, these attempts are still far from practical due to the tremendous computational cost on cloud users. Moreover, collusion between misbehaving cloud servers and revoked users is not considered. This paper proposes a novel data integrity checking scheme characterized by multi-user modification, collusion resistance and a constant computational cost of integrity checking for cloud users, thanks to our novel design of polynomial-based authentication tags and proxy tag update techniques. Our scheme also supports public checking and efficient user revocation and is provably secure. Numerical analysis and extensive experimental results show the efficiency and scalability of our proposed scheme.

【Keywords】: cloud computing; data integrity; groupware; polynomials; security of data; cloud data services security; cloud data sharing; cloud-stored data; collusion resistance; computational cost; data integrity checking; multiuser modification; numerical analysis; polynomial-based authentication tags; proxy tag update techniques; public integrity checking; Algorithm design and analysis; Authentication; Computational efficiency; Polynomials; Radio frequency; Servers

238. A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.

Paper Link】 【Pages】:2130-2138

【Authors】: Cong Wang ; Bingsheng Zhang ; Kui Ren ; Janet Meiling Wang Roveda ; Chang Wen Chen ; Zhen Xu

【Abstract】: Wireless sensors are being increasingly used to monitor/collect information in healthcare medical systems. For resource-efficient data acquisition, one major trend today is to utilize compressive sensing, for it unifies traditional data sampling and compression. Despite the increasing popularity, how to effectively process the ever-growing healthcare data and simultaneously protect data privacy, while maintaining low overhead at sensors, remains challenging. To address the problem, we propose a privacy-aware cloud-assisted healthcare monitoring system via compressive sensing, which integrates different domain techniques with following benefits. By design, acquired sensitive data samples never leave sensors in unprotected form. Protected samples are later sent to cloud, for storage, processing, and disseminating reconstructed data to receivers. The system is privacy-assured where cloud sees neither the original samples nor underlying data. It handles well sparse and general data, and data tampered with noise. Theoretical and empirical evaluations demonstrate the system achieves privacy-assurance, efficiency, effectiveness, and resource-savings simultaneously.

【Keywords】: cloud computing; compressed sensing; data acquisition; data compression; data protection; health care; information dissemination; medical information systems; patient monitoring; wireless sensor networks; compressive sensing; data compression; data privacy; data protection; data reconstruction; data sampling; healthcare medical systems; information dissemination; privacy-assurance; privacy-aware cloud-assisted healthcare monitoring system; resource-efficient data acquisition; wireless sensors; Compressed sensing; Medical services; Monitoring; Receivers; Security; Sensor systems

FT3: Fault tolerancy and survivability 3 3

239. Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage.

Paper Link】 【Pages】:2139-2147

【Authors】: Jing Zhang ; Xiangke Liao ; Shanshan Li ; Yu Hua ; Xue Liu ; Bin Lin

【Abstract】: Node failures often occur in large-scale data centers today. Erasure coded storage system provides high data reliability via data reconstruction. Existing work can improve reconstruction performance, while considering the transmission of recovery data as the main source of reconstruction overheads. Transmission costs are highly related with network topology, which is unfortunately overlooked. An ideal connected topology assumes that two nodes in a data center has a direct link. The unmatching design between the network model and the practical topology may lead to an underestimated transmission costs. In this paper, we propose an erasure coded storage system for data reconstruction, which uses the practical network topology to minimize the reconstruction transmission costs. First, we identify the aggregation feature of erasure coding reconstruction and propose Aggregation Decoding, which splits the decoding process into several sub-decoding operations during reconstruction routing to reduce overall recovery data to be transmitted. We further improve Aggrecode to construct efficient route basing on the location of participating nodes to exploit the aggregation feature of Aggregation Decoding. We formulate this routing problem as a relaxed Steiner Tree problem. We design two heuristic routing algorithms based on ant-colony optimization specialized for two failure recovery cases, e.g., node recovery and degraded read. Our analytical results demonstrate the important properties of Aggrecode. These properties are evaluated by extensive experiments deployed on popular data center topologies, such as Torus, Fat-tree, DCell and BCube. The results show that Aggrecode can reduce data transmission costs by at least 37.12% for all settings.

【Keywords】: ant colony optimisation; computer centres; encoding; telecommunication network reliability; telecommunication network routing; telecommunication network topology; Steiner tree problem; aggrecode; aggregation decoding; ant colony optimization; connected topology; data center; data reconstruction; data reliability; direct link; erasure coded storage system; erasure coding reconstruction; network topology; node failures; route intersection construction; transmission costs; underestimated transmission costs; unmatching design; Decoding; Encoding; Heuristic algorithms; Network topology; Routing; Topology; Vegetation

Paper Link】 【Pages】:2148-2156

【Authors】: Theodore Elhourani ; Abishek Gopalan ; Srinivasan Ramasubramanian

【Abstract】: The introduction of coherent optics and wavelength division multiplexing (WDM) in telecommunication networks has led to unprecedented gains in backbone capacity. The increase in optical layer capacity inadvertently exacerbates the problem of traffic loss due to optical component failures. IP networks are designed over optical backbone networks, where each IP link traverses a multihop optical lightpath. Therefore, the failure of optical components often lead to multiple link failures in the IP network. In this paper, we develop an IP fast reroute mechanism using rooted arc-disjoint spanning trees that guarantees recovery from (k-1) link failures in a k-edge-connected network. As arc-disjoint spanning trees may be constructed in sub-quadratic time in the size of the network, our approach offers excellent scalability. Through experimental results, we show that employing arc-disjoint spanning trees to recover from multiple failures reduces path stretch in comparison with previously known techniques.

【Keywords】: IP networks; computer network reliability; light coherence; optical links; telecommunication network routing; telecommunication traffic; trees (mathematics); wavelength division multiplexing; (k-1) link failure; IP fast reroute mechanism; IP network link; coherent optics; k-edge connected network; multihop optical lightpath; multilink failure; optical backbone networks; optical component failure; optical layer capacity; rooted arc disjoint spanning tree; subquadratic time; telecommunication network; traffic loss; wavelength division multiplexing; Computers; Conferences; IP networks; Optical fiber networks; Routing; Vectors

241. Rippler: Delay injection for service dependency detection.

Paper Link】 【Pages】:2157-2165

【Authors】: Ali Zand ; Giovanni Vigna ; Richard A. Kemmerer ; Christopher Kruegel

【Abstract】: Detecting dependencies among network services has been well-studied in previous research. These attempts at service dependency detection fall into two classes: active and passive approaches. While passive approaches suffer from high false positives, active approaches suffer from applicability problems. In this paper, we design a new application-independent active approach for detecting dependencies among services. We present a traffic watermarking approach with arbitrarily low false positives and easy applicability. We provide statistical tests for detecting watermarked flows, and we compute the false positive and false negative rates of these tests both analytically and experimentally. Furthermore, we implemented the proposed watermarking system (Rippler) in a small university lab network. We ran our system for four months and detected 38 dependencies among 54 services. Finally, we compared the efficiency of our approach against three previous systems by testing them on this real-world network data.

【Keywords】: delays; electronic mail; statistical testing; telecommunication security; telecommunication traffic; watermarking; Rippler; delay injection; electronic mail; service dependency detection; statistical tests; traffic watermarking approach; Computers; Delays; Electronic mail; Jitter; Noise; Servers; Watermarking

SB3: Scheduling and buffer management 3 4

242. Minimizing makespan and total completion time in MapReduce-like systems.

Paper Link】 【Pages】:2166-2174

【Authors】: Yuqing Zhu ; Yiwei Jiang ; Weili Wu ; Ling Ding ; Ankur Teredesai ; Deying Li ; Wonjun Lee

【Abstract】: Effectiveness of MapReduce as a big data processing framework depends on efficiencies of scale for both map and reduce phases. While most map tasks are preemptive and parallelizable, the reduce tasks typically are not easily decomposed and often become a bottleneck due to constraints of data locality and task complexity. By assuming that reduce tasks are non-parallelizable, we study offline scheduling of minimizing makespan and minimizing total completion time, respectively. Both preemptive and non-preemptive reduce tasks are considered. On makespan minimization, for preemptive version we design an algorithm and prove its optimality, for non-preemptive version we design an approximation algorithm with the worst ratio of 3/2-1/2h where h is the number of machines. On total complete time minimization, for non-preemptive version we devise an approximation algorithm with worst case ratio of 2-1/h, and for preemptive version we devise a heuristic. We confirm that our algorithms outperform state-of-art schedulers through experiments.

【Keywords】: Big Data; approximation theory; data mining; MapReduce-like system; approximation algorithm; big data processing; makespan minimization; offline scheduling; total completion time; Algorithm design and analysis; Approximation algorithms; Approximation methods; Educational institutions; Minimization; Optimal scheduling; Schedules

243. Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments.

Paper Link】 【Pages】:2175-2183

【Authors】: Yi Yuan ; Dan Wang ; Jiangchuan Liu

【Abstract】: MapReduce has achieved tremendous success for large-scale data processing in data centers. A key feature distinguishing MapReduce from previous parallel models is that it interleaves parallel and sequential computation. Past schemes, and especially their theoretical bounds, on general parallel models are therefore, unlikely to be applied to MapReduce directly. There are many recent studies on MapReduce job and task scheduling. These studies assume that the servers are assigned in advance. In current data centers, multiple MapReduce jobs of different importance levels run together. In this paper, we investigate a schedule problem for MapReduce taking server assignment into consideration as well. We formulate a MapReduce server-job organizer problem (MSJO) and show that it is NP-complete. We develop a 3-approximation algorithm and a fast heuristic. We evaluate our algorithms through both simulations and experiments on Amazon EC2 with an implementation in Hadoop. The results confirm the advantage of our algorithms.

【Keywords】: approximation theory; computational complexity; parallel programming; scheduling; 3-approximation algorithm; Amazon EC2; Hadoop; MSJO; MapReduce server-job organizer problem; NP-complete problem; data centers; fast heuristic; job scheduling; joint scheduling; large-scale data processing; parallel computation; parallel models; sequential computation; server assignment; task scheduling; Complexity theory; Delays; Mars; Processor scheduling; Schedules; Scheduling; Servers

244. Scheduling in a secure wireless network.

Paper Link】 【Pages】:2184-2192

【Authors】: Xuan Wang ; Yi Chen ; Lin Cai ; Jianping Pan

【Abstract】: We consider a scheduling problem in a wireless network which consists of one base station, N legitimate users and one (or more) eavesdropper(s). The scheduling problem jointly considers the reliability, security and stability of the system, and is to allocate wireless resources to the legitimate users, stabilize the system and maximize the secure transmission rate. Based on the stochastic network optimization framework, the scheduling problem is decomposed to an online optimization problem. A scheduling algorithm and a low computational complexity algorithm that both do not consider power adaptation are proposed, along with a power adaptive one. Extensive simulations are conducted to show the impact of the information arrival rate and the eavesdropper's channel condition on the system performance. These observations provide important insights and guidelines for the design and resource management of future wireless networks using secure communication technologies.

【Keywords】: computational complexity; optimisation; radio networks; resource allocation; scheduling; telecommunication security; wireless channels; base station; computational complexity algorithm; eavesdropper channel; information arrival rate; legitimate user; online optimization; resource management; scheduling algorithm; secure wireless network; stochastic network optimization framework; system reliability; system stability; transmission rate; wireless resource allocation; Computational complexity; Fading; Receivers; Reliability; Security; Wireless networks

245. Scheduling multicast traffic with deadlines in wireless networks.

Paper Link】 【Pages】:2193-2201

【Authors】: Kyu Seob Kim ; Chih-Ping Li ; Eytan Modiano

【Abstract】: We consider the problem of transmitting multicast flows with hard deadlines over unreliable wireless channels. Every user in the network subscribes to several multicast flows, and requires a minimum throughput for each subscribed flow to meet the QoS constraints. The network controller schedules the transmissions of multicast traffic based on the instant feedback from the users. We characterize the multicast throughput region by analyzing its boundary points, each of which is the solution to a finite-horizon dynamic programming problem over an exponentially large state space. Using backward induction and interchange arguments, we show that the dynamic programming problems are solved by greedy policies that maximize the immediate weighted sum throughput in every slot. Furthermore, we develop a dynamic throughput-optimal policy that achieves any feasible throughput vector by tracking the running performance received by the users.

【Keywords】: dynamic programming; greedy algorithms; multicast communication; quality of service; radio networks; scheduling; wireless channels; QoS constraint; backward induction; deadlines; dynamic throughput optimal policy; finite horizon dynamic programming problem; greedy policy; multicast flow transmission; multicast throughput region; multicast traffic transmission scheduling; network controller; network subscribe; running performance tracking; unreliable wireless channel; user feedback; weighted sum throughput maximization; wireless networks; Base stations; Dynamic programming; Throughput; Unicast; Vectors; Wireless networks

SC3: Social computing and networks 3 4

246. Epidemic thresholds with external agents.

Paper Link】 【Pages】:2202-2210

【Authors】: Siddhartha Banerjee ; Avhishek Chatterjee ; Sanjay Shakkottai

【Abstract】: We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents - sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds use in many settings - epidemiology, marketing and advertising, network robustness, etc. We provide a detailed characterization of the impact of external agents on epidemic thresholds. In particular, for the SIS model, we show that any external infection strategy with constant virulence either fails to significantly affect the lifetime of an epidemic, or at best, sustains the epidemic for a lifetime which is polynomial in the number of nodes. On the other hand, a random external-infection strategy, with rate increasing linearly in the number of infected nodes, succeeds under some conditions to sustain an exponential epidemic lifetime. We obtain similar sharp thresholds for the SIR model, and discuss the relevance of our results in a variety of settings.

【Keywords】: epidemics; graph theory; SIS-SIR dynamics; advertising; epidemic processes; epidemic spreading; epidemic thresholds; epidemiology; external agents; external infection sources; externally aided epidemics; graph; limited infection rate; marketing; network robustness; phase transitions; random external-infection strategy; virulence; Advertising; Analytical models; Computational modeling; Computers; Conferences; Markov processes; Polynomials

247. A robust information source estimator with sparse observations.

Paper Link】 【Pages】:2211-2219

【Authors】: Kai Zhu ; Lei Ying

【Abstract】: In this paper, we consider the problem of locating the information source with sparse observations. We assume that a piece of information spreads in a network following a heterogeneous susceptible-infected-recovered (SIR) model, where a node is said to be infected when it receives the information and recovered when it removes or hides the information. We further assume that a small subset of infected nodes are reported, from which we need to find the source of the information. We adopt the sample path based estimator developed in [1], and prove that on infinite trees, the sample path based estimator is a Jordan infection center with respect to the set of observed infected nodes. In other words, the sample path based estimator minimizes the maximum distance to observed infected nodes. We further prove that the distance between the estimator and the actual source is upper bounded by a constant independent of the number of infected nodes with a high probability on infinite trees. Our simulations on tree networks and real world networks show that the sample path based estimator is closer to the actual source than several other algorithms.

【Keywords】: computer viruses; social networking (online); Jordan infection center; SIR model; infected nodes; infinite trees; robust information source estimator; sample path; sparse observations; susceptible infected recovered model; tree networks; Computational modeling; Computers; Conferences; Heuristic algorithms; Maximum likelihood estimation; Network topology; Robustness

248. Personal clouds: Sharing and integrating networked resources to enhance end user experiences.

Paper Link】 【Pages】:2220-2228

【Authors】: Minsung Jang ; Karsten Schwan ; Ketan Bhardwaj ; Ada Gavrilovska ; Adhyas Avasthi

【Abstract】: End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the scope' of the data available locally. ThePersonal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile device via seamless use of both nearby and remote cloud resources. In contrast to vendor-specific, middleware-based cloud solutions, Personal Cloud instances are created at hypervisor-level, to create for each end user the federation of networked resources best suited for the current environment and use. Specifically, the Cirrostratus extensions of the Xen hypervisor can federate a user's networked resources to establish a personal execution environment, governed by policies that go beyond evaluating network connectivity to also consider device ownership and access rights, the latter managed in a secure fashion via standard Social Network Services. Experimental evaluations with both Linux- and Android-based devices, and using Facebook as the SNS, show the approach capable of substantially augmenting a device's innate capabilities, improving application performance and the effective functionality seen by end users.

【Keywords】: cloud computing; mobile computing; smart phones; social networking (online); virtualisation; Android-based devices; Linux-based devices; SNS; Xen hypervisor-level; cirrostratus extensions; cloud computing; distributed software abstractions; end user experiences; facebook; middleware-based cloud solutions; mobile devices; network connectivity; personal cloud; personal execution environment; remote cloud resources; social network services; user networked resource sharing; Authentication; Clouds; Face recognition; Facebook; Mobile handsets; Resource management; Runtime; Android; capability sharing; cloud computing; management of distributed resources; mobile computing; social network services; virtualization; workload offloading

249. Modeling social network relationships via t-cherry junction trees.

Paper Link】 【Pages】:2229-2237

【Authors】: Brian Proulx ; Junshan Zhang

【Abstract】: The massive scale of online social networks makes it very challenging to characterize the underlying structure therein. In this paper, we employ the t-cherry junction tree, a very recent advancement in probabilistic graphical models, to develop a compact representation and good approximation of an otherwise intractable model for users' relationships in a social network. There are a number of advantages in this approach: (1) the best approximation possible via junction trees belongs to the class of t-cherry junction trees; (2) constructing a t-cherry junction tree can be largely parallelized; and (3) inference can be performed using distributed computation. To improve the quality of approximation, we also devise an algorithm to build a higher order tree gracefully from an existing one, without constructing it from scratch. We apply this approach to Twitter data containing 100,000 nodes and study the problem of recommending connections to new users.

【Keywords】: inference mechanisms; probability; social networking (online); trees (mathematics); Twitter data; approximation quality improvement; higher-order tree; inference; online social networks; probabilistic graphical models; social network relationship modeling; t-cherry junction trees; user connection recommendation problem; user relationships; Approximation algorithms; Approximation methods; Clustering algorithms; Junctions; Particle separators; Random variables; Social network services

CR2: Cognitive radio networks 2 4

250. Spectrum-aware data replication in intermittently connected cognitive radio networks.

Paper Link】 【Pages】:2238-2246

【Authors】: Jing Zhao ; Guohong Cao

【Abstract】: The opening of under-utilized spectrum creates an opportunity for unlicensed users to achieve substantial performance improvement through cognitive radio techniques. In cognitive radio ad-hoc networks, with node mobility and low node density, the network topology is highly dynamic and end-to-end connection is hard to maintain. We propose data replication techniques to address these problems and improve data access performance in such intermittently connected cognitive radio network. Although data replication has been extensively studied in traditional disruption tolerant networks, existing techniques cannot be directly applied here since they do not consider the effects of primary user appearance on data replication. In this paper, we formulate spectrum-aware data replication as an optimization problem which tries to maximize the average data retrieval probability, subject to storage and time constraints. Since the problem is hard to solve based on mixed integer programming, we further design a distributed replication scheme based on the metric of replication benefit. Extensive simulations based on synthetic and realistic traces show that our scheme outperforms existing schemes in terms of data retrieval probability in various scenarios.

【Keywords】: ad hoc networks; cognitive radio; integer programming; telecommunication network reliability; ad hoc network; average data retrieval probability; data access performance; disruption tolerant network; intermittently connected cognitive radio networks; mixed integer programming; network topology; node mobility; optimization problem; spectrum aware data replication; underutilized spectrum; Ad hoc networks; Availability; Cognitive radio; Data communication; Peer-to-peer computing; Probability; Time factors

251. Rendezvous for heterogeneous spectrum-agile devices.

Paper Link】 【Pages】:2247-2255

【Authors】: Shan-Hung Wu ; Ching-Chan Wu ; Wing-Kai Hon ; Kang G. Shin

【Abstract】: Cognitive radio (CR) is intended to meet the exponentially growing demand for spectrum by allowing for opportunistic utilization of idle legacy channels. Rendezvous, where two radios complete handshaking in an idle channel, is a key step for “stranger” (unknown to each other) CRs to start communication. However, none of existing algorithms guarantee rendezvous for heterogeneous or stranger CRs with different spectrum-sensing capabilities, in spite of the fact that (i) a wide variety of mobile devices are equipped with heterogeneous radios and (ii) there are numerous applications requiring efficient rendezvous for heterogeneous radios/CRs. In this paper, we propose a new channel hopping algorithm, called Heterogeneous Hopping (HH), that guarantees rendezvous without assuming existence of a universal channel set that can be sensed by all radios. HH is realized with a two-layer design that harmonizes the fixed-short-cycle and parity-alignment techniques we propose here, in order to guide CRs to rendezvous in two complementary situations resulting from the different capabilities of mobile wireless devices. To best of our knowledge, HH is the first channel-hopping scheme that guarantees rendezvous between heterogeneous radios. Our in-depth evaluation has shown HH to be significantly faster than simple extensions of existing schemes. Moreover, the latter cannot guarantee successful rendezvous, either.

【Keywords】: cognitive radio; mobile handsets; radio spectrum management; signal detection; HH; channel hopping algorithm; cognitive radio; fixed-short-cycle technique; heterogeneous CR; heterogeneous hopping; heterogeneous radio; heterogeneous spectrum-agile devices; idle legacy channel opportunistic utilization; mobile wireless devices; parity-alignment technique; rendezvous efficiency; spectrum-sensing capability; stranger CR; two-layer design; universal channel set; Ad hoc networks; Availability; Nickel; Sensors; Silicon; Wireless communication; Wireless sensor networks

252. GHz-wide sensing and decoding using the sparse Fourier transform.

Paper Link】 【Pages】:2256-2264

【Authors】: Haitham Hassanieh ; Lixin Shi ; Omid Abari ; Ezzeldin Hamed ; Dina Katabi

【Abstract】: We present BigBand, a technology that can capture GHz of spectrum in realtime without sampling the signal at GS/s - i.e., without high speed ADCs. Further, it is simple and can be implemented on commodity low-power radios. Our approach builds on recent advances in the area of sparse Fourier transforms, which show that it is possible to reconstruct a sparse signal without sampling it at the Nyquist rate. To demonstrate our design, we implement it using 3 software radios, each sampling the spectrum at 50 MS/s, producing a device that captures 0.9 GHz - i.e., 6× larger digital bandwidth than the three software radios combined. Finally, an extension of BigBand can perform GHz spectrum sensing even in scenarios where the spectrum is not sparse.

【Keywords】: Fourier transforms; compressed sensing; decoding; radio spectrum management; signal reconstruction; signal sampling; software radio; BigBand; Nyquist rate; commodity low-power radios; digital bandwidth; frequency 0.9 GHz; gigahertz-wide decoding; gigahertz-wide spectrum sensing; software radios; sparse Fourier transform; sparse signal reconstruction; wireless communication; Bandwidth; Fourier transforms; Frequency estimation; Hardware; Sensors; Time-frequency analysis; Wireless communication

253. Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction.

Paper Link】 【Pages】:2265-2273

【Authors】: Peng Lin ; Xiaojun Feng ; Qian Zhang

【Abstract】: In spectrum trading markets, auctions are organized by spectrum holders (SHs) to distribute channels. As buyers, wireless service providers (WSPs) acquire channels to deploy services to end users. To optimize the profits, it is essential for the WSPs to determine their bidding strategies, which are affected by two key aspects: the service position to the end users and the auction schemes enforced by the SH. In this paper, we jointly study the strategy of the SH in the auction design and the WSPs' strategies in the service provisions and biddings. The WSP's optimal strategy in the auction can be flexible in term of demands and valuations. To optimize social welfare and enable the WSPs to reveal truthful flexible demands, we design Flexauc, a novel auction mechanism for the SH. We prove theoretically that Flexauc not only maximizes the social welfare but also preserves other nice properties: truthfulness and computational tractability.

【Keywords】: radio spectrum management; tendering; wireless channels; Flexauc; SHs; WSP optimal strategy; auction schemes; bidding strategy; flexible auction; social welfare; spectrum holders; spectrum trading markets; wireless service providers; Algorithm design and analysis; Bandwidth; Computers; Conferences; Cost accounting; Nickel; Pricing

DT: Delay tolerant networks 4

254. Multiple heterogeneous data ferry trajectory planning in wireless sensor networks.

Paper Link】 【Pages】:2274-2282

【Authors】: Lirong Xue ; Donghyun Kim ; Yuqing Zhu ; Deying Li ; Wei Wang ; Alade O. Tokuta

【Abstract】: This paper investigates two new groups of trajectory optimization problems which stem from networked multi-robotic systems. In particular, we study how to efficiently collect data from stationary sensor nodes using multiple robotic vehicles such as data ferries under different circumstance. The first group includes two new problems which aim to find the tours and the paths, respectively, of k robot vehicles with different mobilization conditions to collect data from ground sensor nodes with minimum latency. The second group consists of one new problem whose goal is to determine the quality tours of k robot vehicles with different speeds, where each of which follows its corresponding tour to repeatedly collect data from stationary sensors. We prove the three problems are NP-hard and propose constant factor approximation strategies for them. Through a simulation, an analytical study is conducted to evaluate the average performance of our core contribution.

【Keywords】: approximation theory; computational complexity; graph theory; mobile robots; multi-robot systems; path planning; trajectory control; travelling salesman problems; wireless sensor networks; NP-hard problem; constant factor approximation strategies; data collection; minimum latency; mobile robots; mobilization conditions; multiple heterogeneous data ferry trajectory planning; multiple robotic vehicles; networked multirobotic systems; quality tours; stationary sensor nodes; trajectory control; trajectory optimization problems; traveling salesperson problem; unmanned aerial vehicles; wireless sensor networks; Algorithm design and analysis; Approximation algorithms; Approximation methods; Mobile nodes; Robot sensing systems; Trajectory; Approximation algorithm; graph theory; mobile elements; trajectory control; traveling salesperson problem; wireless sensor network

255. DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information.

Paper Link】 【Pages】:2283-2291

【Authors】: Kang Chen ; Haiying Shen

【Abstract】: In delay tolerant networks (DTNs), enabling a node to search and find an interested mobile node is an important function in many applications. However, the movement of nodes in DTNs makes the problem formidable. Current methods in disconnected networks mainly rely on fixed stations and infrastructure-based communication to collect node position information, which is difficult to implement in DTNs. In this paper, we present DSearching, a distributed mobile node searching scheme for DTNs that requires no infrastructure except the GPS on mobile nodes. In DSearching, the entire DTN area is split into sub-areas, and each node summarizes its mobility information as both transient sub-area visiting record and long-term movement pattern among sub-areas. Each node distributes its transient visiting record for a newly entered sub-area to nodes that are likely to stay in the sub-area that it just moves out, so that the information flows in the network for the locator to trace it along its actual movement path. Each node also stores different parts of its long-term mobility pattern to long-staying nodes in different sub-areas for the locator to trace it when visiting records are absent. Considering that nodes in DTNs usually have limited resources, DSearching constrains the communication and storage cost in the information distribution process. Extensive trace-driven experiments with real traces demonstrate the high efficiency and high effectiveness of DSearching.

【Keywords】: Global Positioning System; delay tolerant networks; mobile communication; mobility management (mobile radio); DSearching; DTN area; GPS; delay tolerant networks; disconnected networks; distributed mobile node searching scheme; floating mobility information distribution; infrastructure based communication; long term movement pattern; node position information; storage cost; trace driven experiment; transient subarea visiting record; Animals; Computers; Conferences; Mobile nodes; Nickel; Transient analysis

256. Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications.

Paper Link】 【Pages】:2292-2300

【Authors】: Jeongho Kwak ; Okyoung Choi ; Song Chong ; Prasant Mohapatra

【Abstract】: Energy-delay tradeoffs in smartphone applications have been studied independently in dynamic voltage and frequency scaling (DVFS) problem and network interface selection problem. We optimize the two problems jointly to quantify how much energy can be saved further and propose a scheme called SpeedControl which jointly manages application scheduling, CPU speed control and wireless interface selection. The scheme is shown to be near-optimal in that it tends to minimize energy consumption for given delay constraints. This paper is the first to reveal energy-delay tradeoffs in a holistic view considering multiple wireless interfaces, DVFS and multitasking in smartphone. We perform real measurements on WiFi/3G coverage and throughput, power consumption of CPU and WiFi/3G interfaces, and CPU workloads. Trace-driven simulations based on the measurements demonstrate that SpeedControl can save over 30% of battery by trading 10 min delay as compared to existing schemes when WiFi temporal coverage is 65%, moreover, the saving tendency increases as WiFi coverage increases.

【Keywords】: energy consumption; mobile computing; power aware computing; smart phones; wireless LAN; CPU; DVFS; SpeedControl scheme; WiFi-3G interfaces; delay-tolerant smartphone; dynamic speed scaling; dynamic voltage and frequency scaling problem; energy minimization; energy-delay tradeoffs; trace-driven simulation; wireless interface selection; Algorithm design and analysis; Artificial neural networks; Delays; Energy consumption; IEEE 802.11 Standards; Network interfaces; Power demand

257. Forwarding redundancy in opportunistic mobile networks: Investigation and elimination.

Paper Link】 【Pages】:2301-2309

【Authors】: Wei Gao ; Qinghua Li ; Guohong Cao

【Abstract】: Opportunistic mobile networks consist of mobile devices which are intermittently connected via short-range radios. Forwarding in such networks relies on selecting relays to carry and deliver data to destinations upon opportunistic contacts. Due to the intermittent network connectivity, relays in current forwarding schemes are selected separately in a distributed manner. The contact capabilities of relays hence may overlap when they contact the same nodes and cause forwarding redundancy. This redundancy reduces the efficiency of resource utilization in the network, and may impair the forwarding performance if being ignored. In this paper, based on experimental investigations on the characteristics of forwarding redundancy in realistic mobile networks, we propose methods to eliminate unnecessary forwarding redundancy and ensure efficient utilization of network resources. We first develop techniques to eliminate forwarding redundancy with global network information, and then improve these techniques to be operable in a fully distributed manner with limited network information.

【Keywords】: delay tolerant networks; mobile radio; relay networks (telecommunication); delay-disruption tolerant networks; forwarding redundancy elimination; global network information; intermittent network connectivity; mobile devices; network resources; opportunistic contacts; opportunistic mobile networks; realistic mobile networks; relays; resource utilization; short-range radios; Computers; Correlation; Mobile communication; Mobile computing; Peer-to-peer computing; Redundancy; Relays

LL: Localization and location privacy 4

258. Privacy-preserving high-quality map generation with participatory sensing.

Paper Link】 【Pages】:2310-2318

【Authors】: Xi Chen ; Xiaopei Wu ; Xiang-Yang Li ; Yuan He ; Yunhao Liu

【Abstract】: Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based map generation method does need individual locations. To address the issue, we present a systematic participatory-sensing-based high-quality map generation scheme, PMG, that meets the privacy demand of individual users. In this approach, individual users merely need to upload unorganized sparse location points so as to reduce the risk of exposing privacy, while the server generates accurate maps with unorganized points, instead of user traces. Experiments show that our solution is able to generate high-quality maps for a real environment that is robust to noisy data. The difference between the ground-truth map and the produced map is <; 10m, even when the collected locations are about 32m apart after clustering for the purpose of removing noise.

【Keywords】: data privacy; mobile computing; smart phones; crowdsourcing based map generation; location-based services; participatory sensing; privacy-preserving high-quality map generation; smart phones; Computers; Conferences; Global Positioning System; Greedy algorithms; Privacy; Roads; Servers; crust; map generation; privacy-preserving

259. Multi-lateral privacy-preserving localization in pervasive environments.

Paper Link】 【Pages】:2319-2327

【Authors】: Tao Shu ; Yingying Chen ; Jie Yang ; Albert Williams

【Abstract】: Location based services (LBSs) have raised serious privacy concerns in the society, due to the possibility of leaking a mobile user's location information in enabling location-dependent services. While existing location-privacy studies are mainly focused on preventing the leakage of user's location in accessing the LBS server, the possible privacy leakage during the localization process has been largely ignored. Such a privacy leakage stems from the fact that a localization algorithm typically takes the location of anchors (i.e., reference points for localization) as input, and generates the target's location as output. As such, the location of anchors, and consequently the target's location, could be leaked to others. An adversary could further utilize the leakage of anchor's locations to attack the localization infrastructure and undermine the accurate estimation of the target's location. To address this issue, in this paper, we study the multi-lateral privacy preserving localization problem, whereby the location of a target is calculated without the need of revealing anchors' location, and the knowledge of the localization outcome is strictly limited to the target itself. To fully protect user's privacy, our study protects not only the user's exact location information (the geo-coordinates), but also any side information that may lead to a coarse estimate of the location. Three privacy-preserving localization solutions are developed by leveraging combinations of information hiding and homomorphic encryption. These solutions provide different levels of protection for location side information and resilience to node collusion, and have the advantage of being able to trade user's privacy requirements for better computation/communication efficiency.

【Keywords】: cryptography; data encapsulation; data privacy; mobile computing; LBS; anchor location; computation-communication efficiency; homomorphic encryption; information hiding; localization infrastructure; location based services; location side information; location-dependent services; location-privacy studies; mobile user location information; multilateral privacy-preserving localization; node collusion; pervasive environments; privacy leakage; user location leakage prevention; user privacy requirements; Distance measurement; Encryption; Estimation; Mobile communication; Privacy; Protocols; Servers

260. A stochastic game for privacy preserving context sensing on mobile phone.

Paper Link】 【Pages】:2328-2336

【Authors】: Wei Wang ; Qian Zhang

【Abstract】: The proliferation of sensor-equipped smartphones has enabled an increasing number of context-aware applications that provide personalized services based on users' contexts. However, most of these applications aggressively collect users sensing data without providing clear statements on the usage and disclosure strategies of such sensitive information, which raises severe privacy concerns and leads to some initial investigation on privacy preservation mechanisms design. While most prior studies have assumed static adversary models, we investigate the context dynamics and call attention to the existence of intelligent adversaries. In this paper, we first identify the context privacy problem with consideration of the context dynamics and malicious adversaries with capabilities of adjusting their attacking strategies, and then formulate the interactive competition between users and adversaries as a zero-sum stochastic game. In addition, we propose an efficient minimax learning algorithm to obtain the optimal defense strategy. Our evaluations on real smartphone context traces of 94 users validate the proposed algorithm.

【Keywords】: data privacy; learning (artificial intelligence); minimax techniques; smart phones; stochastic games; ubiquitous computing; attacking strategy; context dynamics; context privacy problem; context-aware application; disclosure strategy; intelligent adversary; interactive competition; minimax learning algorithm; mobile phone; optimal defense strategy; personalized services; privacy preservation mechanisms design; privacy preserving context sensing; sensor-equipped smartphones; static adversary model; user context; user sensing data; zero-sum stochastic game; Context; Context-aware services; Games; Privacy; Sensors; Smart phones; Stochastic processes

261. Achieving privacy preservation in WiFi fingerprint-based localization.

Paper Link】 【Pages】:2337-2345

【Authors】: Hong Li ; Limin Sun ; Haojin Zhu ; Xiang Lu ; Xiuzhen Cheng

【Abstract】: WiFi fingerprint-based localization is regarded as one of the most promising techniques for indoor localization. The location of a to-be-localized client is estimated by mapping the measured fingerprint (WiFi signal strengths) against a database owned by the localization service provider. A common concern of this approach that has never been addressed in literature is that it may leak the client's location information or disclose the service provider's data privacy. In this paper, we first analyze the privacy issues of WiFi fingerprint-based localization and then propose a Privacy-Preserving WiFi Fingerprint Localization scheme (PriWFL) that can protect both the client's location privacy and the service provider's data privacy. To reduce the computational overhead at the client side, we also present a performance enhancement algorithm by exploiting the indoor mobility prediction. Theoretical performance analysis and experimental study are carried out to validate the effectiveness of PriWFL. Our implementation of PriWFL in a typical Android smartphone and experimental results demonstrate the practicality and efficiency of PriWFL in real-world environments.

【Keywords】: computer network security; data privacy; mobile computing; smart phones; wireless LAN; Android smartphone; PriWFL; computational overhead reduction; data privacy; indoor localization; indoor mobility prediction; localization service provider; performance enhancement algorithm; privacy-preserving WiFi fingerprint localization scheme; real-world environments; signal strengths; Accuracy; Cryptography; Data privacy; Databases; IEEE 802.11 Standards; Privacy; Servers; WiFi fingerprint-based localization; data privacy; homomorphic encryption; location privacy

MD: Mobile Data Offloading 4

262. TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks.

Paper Link】 【Pages】:2346-2354

【Authors】: Xiaofei Wang ; Min Chen ; Zhu Han ; Dapeng Oliver Wu ; Ted Taekyoung Kwon

【Abstract】: The ever increasing traffic demand becomes a serious concern of mobile network operators. To solve this traffic explosion problem, there have been many efforts to offload the traffic from cellular links to direct communications among users. In this paper, we propose the framework of Traffic Offloading assisted by Social network services (SNS) via opportunistic Sharing in mobile social networks, TOSS, to offload SNS-based cellular traffic by user-to-user sharing. First we select a subset of users who are to receive the same content as initial seeds depending on their content spreading impacts in online SNSs and their mobility patterns in offline mobile social networks (MSNs). Then users share the content via opportunistic local connectivity (e.g., Bluetooth, Wi-Fi Direct, Device-to-device in LTE) with each other. The observation of SNS user activities reveals that individual users have distinct access patterns, which allows TOSS to exploit the user-dependent access delay between the content generation time and each user's access time for traffic offloading purposes. We model and analyze the traffic offloading and content spreading among users by taking into account various options in linking SNS and MSN trace data. The trace-driven evaluation demonstrates that TOSS can reduce up to 86.5% of the cellular traffic while satisfying the access delay requirements of all users.

【Keywords】: Bluetooth; Long Term Evolution; cellular radio; mobile computing; mobility management (mobile radio); social networking (online); telecommunication traffic; wireless LAN; Bluetooth; LTE; SNS-based cellular traffic offloading; TOSS; Wi-Fi Direct; access patterns; cellular links; content generation time; content spreading impacts; device-to-device; direct communications; mobile network operators; mobility patterns; offline mobile social networks; online SNS; opportunistic local connectivity; social network service-based opportunistic sharing; trace-driven evaluation; traffic demand; traffic explosion problem; user subset selection; user-dependent access delay; user-to-user sharing; Computers; Delays; Educational institutions; Mobile communication; Mobile computing; Silicon; Social network services; Mobile Social Networks; Opportunistic Networks; Social Network Service; Traffic Offloading

263. Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system.

Paper Link】 【Pages】:2355-2363

【Authors】: Marco Valerio Barbera ; Sokol Kosta ; Alessandro Mei ; Vasile Claudiu Perta ; Julinda Stefa

【Abstract】: Mobile-cloud offloading mechanisms delegate heavy mobile computation to the cloud. In real life use, the energy tradeoff of computing the task locally or sending the input data and the code of the task to the cloud is often negative, especially with popular communication intensive jobs like social-networking, gaming, and emailing. We design and build a working implementation of CDroid, a system that tightly couples the device OS to its cloud counterpart. The cloud-side handles data traffic through the device efficiently and, at the same time, caches code and data optimally for possible future offloading. In our system, when offloading decision takes place, input and code are likely to be already on the cloud. CDroid makes mobile cloud offloading more practical enabling offloading of lightweight jobs and communication intensive apps. Our experiments with real users in everyday life show excellent results in terms of energy savings and user experience.

【Keywords】: cloud computing; mobile computing; user interfaces; CDroid; caches code; cloud-aware system; communication intensive apps; communication intensive jobs; data traffic; emailing; gaming; mobile cloud offloading mechanisms; mobile computation; mobile offloading decision; social networking; user experience; Batteries; Computers; Mobile communication; Security; Servers; Smart phones; Synchronization

264. Is it worth to be patient? Analysis and optimization of delayed mobile data offloading.

Paper Link】 【Pages】:2364-2372

【Authors】: Fidan Mehmeti ; Thrasyvoulos Spyropoulos

【Abstract】: Operators have recently resorted to WiFi offloading to deal with increasing data demand and induced congestion. Researchers have further suggested the use of “delayed offloading”: if no WiFi connection is available, (some) traffic can be delayed up to a given deadline, or until WiFi becomes available. Nevertheless, there is no clear consensus as to the benefits of delayed offloading, with a couple of recent experimental studies largely diverging in their conclusions. Nor is it clear how these benefits depend on network characteristics (e.g. WiFi availability), user traffic load, etc. In this paper, we propose a queueing analytic model for delayed offloading, and derive the mean delay, offloading efficiency, and other metrics of interest, as a function of the user's “patience”, and key network parameters. We validate the accuracy of our results using a range of realistic scenarios, and use these expressions to show how to optimally choose deadlines.

【Keywords】: mobile radio; queueing theory; wireless LAN; WiFi availability; WiFi connection; WiFi offloading; data demand; delayed mobile data offloading; mean delay; network characteristics; offloading efficiency; queueing analytic model; user traffic load; Approximation methods; Availability; Delays; Equations; IEEE 802.11 Standards; Markov processes; Mobile communication; 2D Markov chain; Deadlines; Mobile data offloading; Optimization; Queueing

265. Ready, Set, Go: Coalesced offloading from mobile devices to the cloud.

Paper Link】 【Pages】:2373-2381

【Authors】: Liyao Xiang ; Shiwen Ye ; Yuan Feng ; Baochun Li ; Bo Li

【Abstract】: With an abundance of computing resources, cloud computing systems have been widely used to elastically offload the execution of computation-intensive applications on mobile devices, leading to performance gains and better power efficiency. However, existing works have so far focused on one application only, and multiple applications are not coordinated when sending their offloading requests to the cloud. In this paper, we propose the new technique of coalesced offloading, which exploits the potential for multiple applications to coordinate their offloading requests with the objective of saving additional energy on mobile devices. The intuition is that, by sending these requests in “bundles,” the period of time that the network interface stays in the high-power state can be reduced. We present two online algorithms, collectively referred to as Ready, Set, Go (RSG), that make near-optimal decisions on how offloading requests from multiple applications are to be best coalesced. We show, both analytically and experimentally using actual smartphones, that RSG is able to achieve additional energy savings while maintaining satisfactory performance.

【Keywords】: cloud computing; decision making; power aware computing; smart phones; telecommunication power management; RSG; Ready-Set-Go; cloud computing systems; coalesced offloading; computation-intensive applications; computing resources; energy savings; mobile devices; near-optimal decision making; online algorithms; power efficiency; smartphones; Algorithm design and analysis; Delays; Heuristic algorithms; Mobile communication; Mobile handsets; Network interfaces; Optimization

PA1: Performance analysis and modelling 1 4

266. Towards a statistical network calculus - Dealing with uncertainty in arrivals.

Paper Link】 【Pages】:2382-2390

【Authors】: Michael A. Beck ; Sebastian A. Henningsen ; Simon B. Birnbach ; Jens B. Schmitt

【Abstract】: The stochastic network calculus (SNC) has become an attractive methodology to derive probabilistic performance bounds. So far the SNC is based on (tacitly assumed) exact probabilistic assumptions about the arrival processes. Yet, in practice, these are only true approximately-at best. In many situations it is hard, if possible at all, to make such assumptions a priori. A more practical approach would be to base the SNC operations on measurements of the arrival processes (preferably even on-line). In this paper, we develop this idea and incorporate measurements into the framework of SNC taking the further uncertainty resulting from estimation errors into account. This is a crucial step towards a statistical network calculus (StatNC) eventually lending itself to a self-modelling operation of networks with a minimum of a priori assumptions. In numerical experiments, we are able to substantiate the novel opportunities by StatNC.

【Keywords】: calculus; probability; statistical analysis; stochastic processes; SNC; StatNC; arrival process measurement; estimation errors; exact probabilistic assumptions; probabilistic performance bounds; self-modelling operation; statistical network calculus; stochastic network calculus; Calculus; Computers; Conferences; Probabilistic logic; Random variables; Stochastic processes; Uncertainty

267. Towards a system theoretic approach to wireless network capacity in finite time and space.

Paper Link】 【Pages】:2391-2399

【Authors】: Florin Ciucu ; Ramin Khalili ; Yuming Jiang ; Liu Yang ; Yong Cui

【Abstract】: In asymptotic regimes, both in time and space (network size), the derivation of network capacity results is grossly simplified by brushing aside queueing behavior in nonJackson networks. This simplifying double-limit model, however, lends itself to conservative numerical results in finite regimes. To properly account for queueing behavior beyond a simple calculus based on average rates, we advocate a system theoretic methodology for the capacity problem in finite time and space regimes. This methodology also accounts for spatial correlations arising in networks with CSMA/CA scheduling and it delivers rigorous closed-form capacity results in terms of probability distributions. Unlike numerous existing asymptotic results, subject to anecdotal practical concerns, our transient results can be used in practical settings, e.g., to compute the time scales at which multi-hop routing is more advantageous than single-hop routing.

【Keywords】: carrier sense multiple access; probability; scheduling; telecommunication congestion control; telecommunication network routing; CSMA/CA scheduling; asymptotic regimes; closed-form capacity; finite regimes; finite time; multihop routing; nonJackson networks; probability distributions; queueing behavior; single-hop routing; space regimes; spatial correlations; system theoretic approach; wireless network capacity; Calculus; Markov processes; Media Access Protocol; Multiaccess communication; Relays; Routing; Upper bound

268. Fluctuation analysis of debt based policies for wireless networks with hard delay constraints.

Paper Link】 【Pages】:2400-2408

【Authors】: Rahul Singh ; I-Hong Hou ; P. R. Kumar

【Abstract】: Hou et al. have analyzed wireless networks where clients served by an access point require a timely-throughput of packets to be delivered by hard per-packet deadlines and also proved the timely-throughput optimality of certain debt-based policies. However, this is a weak notion of optimality; there might be long time intervals in which a client does not receive any packets, undesirable for real-time applications. Motivated by this, the authors, in an earlier work, introduced a pathwise cost function based on the law of the iterated logarithm, studied in fluctuation theory, which captures the deviation from a steady stream of packet deliveries and showed that a debt-based policy is optimal if the frame length is one. This work extends the analysis of debt-based policies to general frame lengths greater than one, as is important for general applications.

【Keywords】: iterative methods; radio networks; access point; debt fluctuation analysis; debt-based policy; hard delay constraint; iterated logarithm; pathwise cost function; steady packet delivery stream; wireless network; Computers; Conferences; Delays; Limiting; Markov processes; Throughput; Vectors

269. Price of Anarchy in network routing with class based capacity guarantees.

Paper Link】 【Pages】:2409-2417

【Authors】: Ehsan Monsef ; Tricha Anjali ; Sanjiv Kapoor

【Abstract】: In this paper, we consider the inefficiency of distributed routing in a network of parallel links with class-based traffic. Network link behavior is modeled by the M/M/1-GPS queue (i.e. when links use General Processor Sharing(GPS) scheduling scheme to serve packets). Each traffic type is guaranteed a minimum capacity rate on each link using GPS scheduling. We show under specific demand conditions that, among multiple equilibria the worst-case Nash equilibrium occurs when each class dispatcher utilizes all the links to fulfill its demand. Using this fact, we give an upper bound on the Price of Anarchy (PoA). Our results also indicate that, while the price of selfish behavior can be unbounded in a specific demand setting, there exist demand regimes where the bound on PoA is reasonable. These results also apply to the resource allocation or load balancing applications in the processor sharing systems.

【Keywords】: game theory; queueing theory; routing protocols; telecommunication traffic; GPS scheduling scheme; M/M/1-GPS queue; PoA; QoS; class based capacity guarantees; class-based traffic; distributed routing inefficiency; general processor sharing; load balancing; minimum capacity rate; network link behavior; network routing protocols; parallel links; price-of-anarchy; quality-of-service; resource allocation; worst-case Nash equilibrium; Cost function; Delays; Games; Global Positioning System; Nash equilibrium; Quality of service; Routing

SB4: Scheduling and buffer management 4 4

270. Distributed stochastic optimization via correlated scheduling.

Paper Link】 【Pages】:2418-2426

【Authors】: Michael J. Neely

【Abstract】: This paper considers a problem where multiple users make repeated decisions based on their own observed events. The events and decisions at each time step determine the values of a utility function and a collection of penalty functions. The goal is to make distributed decisions over time to maximize time average utility subject to time average constraints on the penalties. An example is a collection of power constrained sensors that repeatedly report their own observations to a fusion center. Maximum time average utility is fundamentally reduced because users do not know the events observed by others. Optimality is characterized for this distributed context. It is shown that optimality is achieved by correlating user decisions through a commonly known pseudorandom sequence. An optimal algorithm is developed that chooses pure strategies at each time step based on a set of time-varying weights.

【Keywords】: distributed decision making; random sequences; scheduling; set theory; stochastic programming; utility theory; correlated scheduling; distributed decision making; distributed stochastic optimization; maximum time average utility; optimal algorithm; penalty functions; power constrained sensors; pseudorandom sequence; time average utility; time-varying weights; utility function; Computers; Conferences; Distributed algorithms; Optimization; Sensor fusion; Vectors

271. Multi-dimensional OFDMA scheduling in a wireless network with relay nodes.

Paper Link】 【Pages】:2427-2435

【Authors】: Reuven Cohen ; Guy Grebla

【Abstract】: LTE-advanced and other 4G cellular standards allow relay nodes (RNs) to be deployed as a substitute for base stations (BSs). Unlike a BS, an RN is not directly connected to the backbone. Rather, each RN is associated with a donor BS, to which it is connected through the OFDMA wireless link. A very important task in the operation of a wireless network is packet scheduling. In a network with RNs, such scheduling decisions must be made in each cell not only for the BS, but also for the RNs. Because the scheduler in a network with RNs must take into account the transmission resources of the BS and the RNs, it needs to find a feasible schedule that does not exceed the resources of a multi-dimensional resource pool. This makes the scheduling problem computationally harder than in a network without RNs. In this paper we define and study for the first time the packet-level scheduling problem for a network with RNs. This problem is shown to be not only NP-hard, but also very hard to approximate. To solve it, we propose an approximation with a performance guarantee, and a simple water-filling heuristic. Using simulations, we evaluate our new algorithms and show that they perform very well.

【Keywords】: OFDM modulation; approximation theory; computational complexity; frequency division multiple access; scheduling; NP-hard problem; OFDMA wireless link; approximation theory; multidimensional OFDMA scheduling; multidimensional resource pool; packet scheduling; packet-level scheduling problem; relay nodes; water-filling heuristic; wireless network; Bandwidth; Interference; Processor scheduling; Relays; Schedules; Scheduling; Signal to noise ratio

272. Application-level scheduling with deadline constraints.

Paper Link】 【Pages】:2436-2444

【Authors】: Huasen Wu ; Xiaojun Lin ; Xin Liu ; Youguang Zhang

【Abstract】: Opportunistic scheduling of delay-tolerant traffic has been shown to substantially improve spectrum efficiency. To encourage users to adopt delay-tolerant scheduling for capacity-improvement, it is critical to provide guarantees in terms of completion time. In this paper, we study application-level scheduling with deadline constraints, where the deadline is pre-specified by users/applications and is associated with a deadline violation probability. To address the exponentially-high complexity due to temporally-varying channel conditions and deadline constraints, we develop a novel asymptotic approach that exploits the largeness of the network to our advantage. Specifically, we identify a lower bound on the deadline violation probability, and propose simple policies that achieve the lower bound in the large-system regime. The results in this paper thus provide a rigorous analytical framework to develop and analyze policies for application-level scheduling under very general settings of channel models and deadline requirements. Further, based on the asymptotic approach, we propose the notion of Application-Level Effective Capacity region, i.e., the throughput region that can be supported subject to deadline constraints, which allows us to quantify the potential gain of application-level scheduling.

【Keywords】: Internet; delay tolerant networks; mobile computing; probability; radio spectrum management; scheduling; telecommunication channels; telecommunication traffic; application-level effective capacity region; application-level scheduling; asymptotic approach; channel models; completion time; deadline constraints; deadline requirements; deadline violation probability; delay-tolerant scheduling; delay-tolerant traffic; opportunistic scheduling; spectrum efficiency; temporally-varying channel conditions; throughput region; Computers; Conferences; Delays; Educational institutions; Optimal scheduling; Processor scheduling; Scheduling

273. Joint static and dynamic traffic scheduling in data center networks.

Paper Link】 【Pages】:2445-2453

【Authors】: Zizhong Cao ; Murali S. Kodialam ; T. V. Lakshman

【Abstract】: The advent and continued growth of large data centers has led to much interest in switch architectures that can economically meet the high capacities needed for interconnecting the thousands of servers in these data centers. Various multilayer architectures employing thousands of switches have been proposed in the literature. We make use of the observation that the traffic in a data center is a mixture of relatively static and rapidly fluctuating components, and develop a combined scheduler for both these components using a generalization of the load-balanced scheduler. The presence of the known static component introduces asymmetries in the ingress-egress capacities, which preclude the use of a load-balanced scheduler as is. We generalize the load-balanced scheduler and also incorporate an opportunistic scheduler which sends traffic on a direct path when feasible to enhance the overall switch throughput. Our evaluations show that this scheduler works very well despite avoiding the use of a central scheduler for making packet-by-packet scheduling decisions.

【Keywords】: computer centres; local area networks; multiprocessor interconnection networks; processor scheduling; resource allocation; telecommunication switching; telecommunication traffic; data center networks; ingress-egress capacities; joint static-and-dynamic traffic scheduling; load-balanced scheduler; multi- layer architectures; opportunistic scheduler; overall switch throughput enhancement; packet-by-packet scheduling decisions; static component; top-of-rack Ethernet switch; Computer architecture; Dynamic scheduling; Matrix decomposition; Optical switches; Schedules; Throughput

WL: Wireless LANs 4

274. SimCast: Efficient video delivery in MU-MIMO WLANs.

Paper Link】 【Pages】:2454-2462

【Authors】: Guanhua Wang ; Kaishun Wu ; Qian Zhang ; Lionel M. Ni

【Abstract】: Wireless video stream delivery is choppy. This problem becomes much severer in MU-MIMO's simultaneous video transmission within the same band. Conventional schemes achieve graceful video delivery by harnessing from high data redundancy. However, with concurrent transmission in the same band, the leverage of high data redundancy leads to high probability of collisions and packets loss, which limits the performance. In concurrent video transmission, achieving efficiency over varied link condition is the main issue. To address this issue, this paper presents SimCast (Simultaneous), a cross-layer design for achieving efficient concurrent video uploading/downloading in MU-MIMO WLANs. The key idea of SimCast is to harness frequency diversity of the channel and spatial similarity of users. We implemented SimCast on USRP2 and conducted extensive simulations. Result shows that SimCast achieves higher throughput than traditional schemes by 1.2× on average. Video quality of SimCast outperforms competitive schemes, which is up to 5 dB in PSNR.

【Keywords】: MIMO communication; multi-access systems; video coding; video streaming; wireless LAN; MU-MIMO WLAN; SimCast; concurrent video transmission; multiuser multiple input multiple output system; simultaneous video transmission; video delivery; video downloading; video uploading; wireless video stream delivery; Decoding; Encoding; Entropy; Frequency diversity; Redundancy; Streaming media; Wireless communication

275. Loss differentiation: Moving onto high-speed wireless LANs.

Paper Link】 【Pages】:2463-2471

【Authors】: Ruwaifa Anwar ; Kamran Nishat ; Mohsin Ali ; Zahaib Akhtar ; Haseeb Niaz ; Ihsan Ayyub Qazi

【Abstract】: A fundamental problem in 802.11 wireless networks is to accurately determine the cause of packet losses. This becomes increasingly important as wireless data rates scale to Gbps, where lack of loss differentiation leads to higher loss in throughput. Recent and upcoming high-speed WLAN standards, such as 802.11n and 802.11ac, use frame aggregation and block acknowledgements for achieving efficient communication. This paper presents BLMon, a framework for loss differentiation, that uses loss patterns within aggregate frames and aggregate frame retries to achieve accurate and low overhead loss differentiation. Towards this end, we carry out a detailed measurement study on a real testbed to ascertain the differences in loss patterns due to noise, collisions, and hidden nodes. We then devise metrics to quantitatively capture these differences. Finally, we design BLMon, which collectively uses these metrics to infer the cause of loss without requiring any out-of-band communication, protocol changes, or customized hardware support. BLMon can be readily deployed on commodity devices using only driver-level changes at the sender-side. We implement BLMon in the ath9k driver and using real testbed experiments, show that it can provide up to 5× improvement in throughput.

【Keywords】: telecommunication congestion control; telecommunication standards; wireless LAN; 802.11 wireless networks; 802.11ac; 802.11n; BLMon; ath9k driver; block acknowledgements; burst loss monitor; frame aggregation; high-speed wireless LAN; loss differentiation; loss patterns; out-of-band communication; packet losses; testbed experiments; wireless data rates; Bit rate; IEEE 802.11n Standard; Loss measurement; Noise; Receivers; Throughput

276. MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission.

Paper Link】 【Pages】:2472-2480

【Authors】: Jiajue Ou ; Yuanqing Zheng ; Mo Li

【Abstract】: 802.11 WLANs suffer from high packet losses due to interference and noise. Packet retransmission is a fundamental way to recover a lost packet. To extract useful information from incorrect symbols and improve retransmission efficiency, we present MISC, a packet retransmission scheme that merges incorrect symbols from multiple transmissions to produce correct ones. MISC proactively creates constellation diversity by rearranging the constellation maps in retransmissions. MISC addresses practical implementation issues and makes minimum amendments to integrate into current 802.11 WLAN framework. We implement MISC in an 802.11-based GNURadio/USRP platform and conduct extensive experiments to evaluate its efficacy. Experiment results demonstrate that MISC can substantially improve the throughput.

【Keywords】: diversity reception; encoding; wireless LAN; GNURadio platform; IEEE 802.11 retransmission; MISC; USRP platform; WLAN; constellation diversity; extract useful information; merging incorrect symbol; packet retransmission scheme; Decoding; Forward error correction; IEEE 802.11 Standards; Noise; Receivers; Transmitters; Wireless LAN

277. Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach.

Paper Link】 【Pages】:2481-2489

【Authors】: Jun Huang ; Guoliang Xing ; Gang Zhou

【Abstract】: The increasing availability of inexpensive off-the-shelf 802.11 hardware has made it possible to deploy access points (APs) densely to ensure the coverage of complex enterprise environments such as business and college campuses. However, dense AP deployment often leads to increased level of wireless contention, resulting in low system throughput. A promising approach to address this issue is to enable the transmission concurrency of exposed terminals in which two senders lie in the range of one another but do not interfere each other's receiver. However, existing solutions ignore the rate diversity of 802.11 and hence cannot fully exploit concurrent transmission opportunities in a WLAN. In this paper, we present TRACK - Transmission Rate Adaptation for Colliding linKs, a novel protocol for harnessing exposed terminals with a rate adaptation approach in enterprise WLANs. Using measurement-based channel models, TRACK can optimize the bit rates of concurrent links to improve system throughput while maintaining link fairness. Our extensive experiments on a testbed of 17 nodes show that TRACK improves system throughput by up to 67% and 35% over 802.11 CSMA and conventional approaches of harnessing exposed terminals.

【Keywords】: business communication; computer network reliability; protocols; wireless LAN; 802.11 CSMA; AP deployment; TRACK; access points; bit rate optimization; complex enterprise environments; enterprise WLANs; inexpensive off-the-shelf 802.11 hardware availability; link fairness; low system throughput; measurement-based channel models; protocol; rate adaptation approach; transmission concurrency; transmission rate adaptation for colliding links; unleashing exposed terminals; wireless contention level; Aggregates; Benchmark testing; Bit rate; Downlink; IEEE 802.11 Standards; Interference; Throughput

CR3: Cognitive radio networks 3 4

278. Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing.

Paper Link】 【Pages】:2490-2498

【Authors】: Tongjie Zhang ; Zongpeng Li ; Reihaneh Safavi-Naini

【Abstract】: In a cognitive radio network, selfish secondary users may not voluntarily contribute to desired cooperative sensing. We design the first fully distributed scheme to incentivize participation of nodes in cooperative sensing, by connecting sensing and spectrum allocation, and offering incentive from latter to the former. Secondary users that are more active and report more accurate sensing values will be given higher reputation values, which results in lower prices in the spectrum allocation phase. Theoretical analysis and simulation results indicate that the proposed method effectively incentivizes sensing participation, and rewards truthful and accurate reporting. Our proposed system is fully distributed and does not rely on a central authority, and so is more applicable in dynamic cognitive radio networks in practice. We also show how to improve the robustness of reputation when malicious nodes report spurious reputation.

【Keywords】: cognitive radio; cooperative communication; pricing; radio spectrum management; distributed cognitive radio networks; dynamic cognitive radio networks; incentivize cooperative sensing; reputation-based pricing; selfish secondary users; spectrum allocation phase; spurious reputation; Accuracy; Cognitive radio; Games; Peer-to-peer computing; Pricing; Resource management; Sensors; Cognitive Radio Networks; Cooperative Sensing; Incentive; Pricing; Reputation; Spectrum Allocation

279. Hitchhike: Riding control on preambles.

Paper Link】 【Pages】:2499-2507

【Authors】: Xiaoyu Ji ; Jiliang Wang ; Mingyan Liu ; Yubo Yan ; Panlong Yang ; Yunhao Liu

【Abstract】: Recently, carrying control signals on passing data packets has emerged as a promising direction for efficient control information transmission. With control messages carried on data payload, the extra air time needed for control packets like RTS/CTS is eliminated and thus channel utilization is improved. However, carrying control signals on the data payload of a packet requires the data packet to have a sufficiently large SNR, otherwise both the data packet and the control messages are lost. In this paper, we propose Hitchhike, a technique that utilizes the preamble field to carry control messages. Hitchhike completely decouples the control messages from the payload and therefore the superposition of (multiple) control messages has little adverse effect on the operation of the payload decoding. We implement and evaluate Hitchhike in the USRP2 platform with 5 nodes. Evaluation results demonstrate the feasibility and effectiveness of Hitchhike. Compared with the state-of-the-art, e.g., Side-channel in 802.15.4, Hitchhike improves the detection accuracy of control messages by 40% and reduces the data loss caused by control messages by 15%.

【Keywords】: data communication; message switching; packet radio networks; Hitchhike; USRP2; adverse effect; control information transmission; control message decoupling; control messages; control packet; control signal; data packet transmission; data payload; payload decoding; riding control; Accuracy; Correlation; Decoding; IEEE 802.15 Standards; Payloads; Receivers; Signal to noise ratio

280. QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying.

Paper Link】 【Pages】:2508-2516

【Authors】: Siddhartha Brahma ; Melissa Duarte ; Ayan Sengupta ; I-Hsiang Wang ; Christina Fragouli ; Suhas N. Diggavi

【Abstract】: Physical layer cooperation of a source with a relay can significantly boost the performance of a wireless connection. However, the best practical relaying scheme can vary depending on the relative strengths of the channels that connect the source, relay and destination. This paper proposes and evaluates QUILT, a system for physical-layer relaying that seamlessly adapts to the underlying network configuration to achieve competitive or better performance as compared to the best current approaches. QUILT combines on-demand, opportunistic use of Decode-Forward (DF) or Quantize-Map-Forward (QMF) followed by interleaving at the relay, with hybrid decoding at the destination that extracts information from received frames even if these are not decodable. We theoretically quantify how our design choices for QUILT affect the system performance. We also deploy QUILT on the WarpLab software radio platform, and show through over-the-air experiments up to 5 times FER improvement over the next best cooperative protocol.

【Keywords】: cooperative communication; decode and forward communication; decoding; relay networks (telecommunication); QMF; QUILT; WarpLab software radio platform; cooperative relaying scheme; decode-forward approach; decode-quantize-interleave-transmit approach; hybrid decoding; network configuration; physical layer cooperation; physical-layer relaying; quantize-map-forward approach; wireless connection; Decoding; IEEE 802.11 Standards; OFDM; Physical layer; Quantization (signal); Relays; Vectors

281. FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions.

Paper Link】 【Pages】:2517-2525

【Authors】: Tarun Bansal ; Bo Chen ; Prasun Sinha

【Abstract】: Sensing white space channels to detect whether a particular channel is free or not is very crucial to the operation of Cognitive Radio Networks (CRNs). Cooperative sensing has been shown to improve the performance of channel sensing. However, cooperative sensing is susceptible to malicious users that may not faithfully follow sensing instructions to save energy and/or time, or to launch denial of service attacks against the network. In this paper, we propose a novel active transmissions based algorithm, FastProbe for detecting malicious users. FastProbe proactively detects malicious users before the CRN causes any interference to the Primary Users. Further, using active transmissions, FastProbe achieves higher detection accuracy while maintaining lower overheads when compared with existing algorithms. Simulations and experiments show that in the presence of malicious nodes operating under 2 different attack models, FastProbe reduces the throughput loss due to sensing by as much as 65% compared to existing algorithms.

【Keywords】: cognitive radio; cooperative communication; signal detection; CRN; FastProbe; active transmissions; attack models; cognitive radio networks; cooperative sensing; denial of service attacks; interference; malicious user detection; novel active transmissions based algorithm; white space channel sensing; Noise; Propagation losses; Scattering; Schedules; Sensors; Testing; Throughput

MA1: Medium access control 1 4

282. Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes.

Paper Link】 【Pages】:2526-2534

【Authors】: Hongxing Li ; Nitin Vaidya

【Abstract】: Carrier Sense Multiple Access (CSMA) protocols have been shown to reach the full capacity region for data communication in wireless networks, with polynomial complexity. However, current literature achieves the throughput optimality with an exponential delay scaling with the network size, even in a simplified scenario for transmission jobs with uniform sizes. Although CSMA protocols with order-optimal average delay have been proposed for specific topologies, no existing work can provide worst-case delay guarantee for each job in general network settings, not to mention the case when the jobs have non-uniform lengths while the throughput optimality is still targeted. In this paper, we tackle on this issue by proposing a two-timescale CSMA-based data communication protocol with dynamic decisions on rate control, link scheduling, job transmission and dropping in polynomial complexity. Through rigorous analysis, we demonstrate that the proposed protocol can achieve a throughput utility arbitrarily close to its offline optima for jobs with non-uniform sizes and worst-case delay guarantees, with a tradeoff of longer maximum allowable delay.

【Keywords】: carrier sense multiple access; computational complexity; CSMA-based data communication protocol; carrier sense multiple access protocols; data communication; job transmission; link scheduling; nonuniform sizes; optimal CSMA-based wireless communication; order-optimal average delay; polynomial complexity; rate control; wireless networks; worst-case delay; Complexity theory; Delays; Heuristic algorithms; Multiaccess communication; Network topology; Protocols; Throughput

Paper Link】 【Pages】:2535-2543

【Authors】: Dongmyung Lee ; Donggyu Yun ; Jinwoo Shin ; Yung Yi ; Se-Young Yun

【Abstract】: In the past few years, an exciting progress has been made on CSMA (Carrier Sense Multiple Access) algorithms that achieve throughput and utility optimality for wireless networks. However, most of these algorithms are known to exhibit poor delay performance making them impractical for implementation. Recently, several papers have addressed the delay issue of CSMA and yet, most of them are limited, in the sense that they focus merely on specific network scenarios with certain conditions rather than general network topology, achieve low delay at the cost of throughput reduction, or lack rigorous provable guarantees. In this paper, we focus on the recent idea of exploiting multiple channels (actually or virtually) for delay reduction in CSMA, and prove that it is per-link delay orderoptimal, i.e., O(1)-asymptotic-delay per link, if the number of virtual channels is logarithmic with respect to mixing time of the underlying CSMA Markov chain. The logarithmic number is typically small, i.e., at most linear with respect to the network size. In other words, our contribution provides not only a provable framework for the multiple-channel based CSMA, but also the required explicit number of virtual-multi-channels, which is of great importance for actual implementation. The key step of our analytic framework lies in using quadratic Lyapunov functions in conjunction with (recursively applying) Lindley equation and Azuma's inequality for obtaining an exponential decaying property in certain queueing dynamics. We believe that our technique is of broad interest in analyzing the delay performances of other general queueing systems.

【Keywords】: Markov processes; carrier sense multiple access; radio networks; telecommunication network topology; Azuma inequality; CSMA Markov chain; Lindley equation; carrier sense multiple access algorithms; delay reduction; exponential decaying property; general queueing systems; general wireless network topology; logarithmic number; multiple-channel based CSMA; provable per-link delay-optimal CSMA; quadratic Lyapunov functions; queueing dynamics; throughput reduction cost; virtual-multichannels; Delays; Markov processes; Multiaccess communication; Network topology; Schedules; Scheduling algorithms; Throughput

284. Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks.

Paper Link】 【Pages】:2544-2552

【Authors】: François Baccelli ; Bartlomiej Blaszczyszyn ; Chandramani Singh

【Abstract】: The proportionally fair sharing of the capacity of a Poisson network using Spatial-Aloha leads to closed-form performance expressions in two extreme cases: (1) the case without topology information, where the analysis boils down to a parametric optimization problem leveraging stochastic geometry; (2) the case with full network topology information, which was recently solved using shot-noise techniques. We show that there exists a continuum of adaptive controls between these two extremes, based on local stopping sets, which can also be analyzed in closed form. We also show that these control schemes are implementable, in contrast to the full information case which is not. As local information increases, the performance levels of these schemes are shown to get arbitrarily close to those of the full information scheme. The analytical results are combined with discrete event simulation to provide a detailed evaluation of the performance of this class of medium access controls.

【Keywords】: access protocols; optimisation; stochastic processes; telecommunication network topology; Poisson networks; adaptive control; adaptive spatial Aloha; closed-form performance expressions; medium access controls; network topology information; parametric optimization problem; shot-noise techniques; stochastic geometry; Geometry; Interference; Network topology; Optimization; Receivers; Throughput; Transmitters

285. Communication through collisions: Opportunistic utilization of past receptions.

Paper Link】 【Pages】:2553-2561

【Authors】: Alireza Vahid ; Mohammad Ali Maddah-Ali ; Amir Salman Avestimehr

【Abstract】: When several wireless users are sharing the spectrum, packet collision is a simple, yet widely used model for interference. Under this model, when transmitters cause interference at any of the receivers, their collided packets are discarded and need to be retransmitted. However, in reality, that receiver can still store its analog received signal and utilize it for decoding the packets in the future (for example, by successive interference cancellation techniques). In this work, we propose a physical layer model for wireless packet networks that allows for such flexibility at the receivers. We assume that the transmitters will be aware of the state of the channel (i.e. when and where collisions occur, or an unintended receiver overhears the signal) with some delay, and propose several coding opportunities that can be utilized by the transmitters to exploit the available signal at the receivers for interference management (as opposed to discarding them). We analyze the achievable throughput of our strategy in a canonical interference channel with two transmitter-receiver pairs, and demonstrate the gain over conventional schemes. By deriving an outer-bound, we also prove the optimality of our scheme for the corresponding model.

【Keywords】: interference suppression; packet radio networks; radio receivers; radio transmitters; radiofrequency interference; communication through collisions; interference cancellation; interference channel; interference management; packet collision; past receptions opportunistic utilization; physical layer model; receivers; transmitter-receiver pairs; transmitters; wireless packet networks; wireless users; Encoding; Interference; Physical layer; Receivers; Signal to noise ratio; Throughput; Transmitters; Packet collision; delayed channel state knowledge; interference; physical layer model; wireless networks

OP: Overlay and peer-to-peer networks 3

286. Open peering by Internet transit providers: Peer preference or peer pressure?

Paper Link】 【Pages】:2562-2570

【Authors】: Aemen Lodhi ; Amogh Dhamdhere ; Constantine Dovrolis

【Abstract】: Peering agreements between Autonomous Systems affect not only the flow of interdomain traffic but also the economics of the entire Internet ecosystem. The conventional wisdom is that transit providers are selective in choosing their settlement-free peers because they prefer to offer revenue-generating transit service to others. Surprisingly, however, a large percentage of transit providers use an Open peering strategy. What causes this large-scale adoption of Open peering, especially among transit providers? More importantly, what is the impact of this peering trend on the economic performance of the population of transit providers? We approach these questions through game-theoretic modeling and agent-based simulations, capturing the dynamics of peering strategy adoption, inter-network formation and interdomain traffic flow. We explain why transit providers gravitate towards Open peering even though that move may be detrimental to their economic fitness. Finally, we examine the impact of an Open peering variant that requires some coordination among providers.

【Keywords】: Internet; game theory; Internet ecosystem; Internet transit providers; agent based simulations; autonomous systems; economic performance; game theoretic modeling; interdomain traffic; interdomain traffic flow; internetwork formation; open peering strategy; peer preference; peer pressure; peering strategy adoption; Analytical models; Computational modeling; Economics; Games; Internet; Peer-to-peer computing; Switches; Autonomous System interconnections; Internet; economic utility; peering strategies; settlement-free peering

287. A stable fountain code mechanism for peer-to-peer content distribution.

Paper Link】 【Pages】:2571-2579

【Authors】: Cédric Westphal

【Abstract】: Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the download rate of the peer-to-peer system to that of downloading the file straight from the server. In other situations, peers are asked to stay in the system even though they have collected all the file's pieces and have an incentive to leave right away. We propose a mechanism which allows peers to act greedily and yet stabilizes the peer-to-peer content sharing system. Our mechanism combines a fountain code at the server to generate innovative new pieces, and a prioritization for the server to deliver pieces only to new peers. While by itself, neither the fountain code nor the prioritization of new peers alone stabilizes the system, we demonstrate that their combination does, through both analytical and numerical evaluation.

【Keywords】: network coding; peer-to-peer computing; file downloading; fountain code mechanism; innovative piece generation; missing piece syndrome; numerical evaluation; peer prioritization; peer-to-peer content distribution; peer-to-peer content sharing system; Bandwidth; Computers; Conferences; Markov processes; Peer-to-peer computing; Servers; Stability analysis

288. Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints.

Paper Link】 【Pages】:2580-2588

【Authors】: Vinay Setty ; Gunnar Kreitz ; Guido Urdaneta ; Roman Vitenberg ; Maarten van Steen

【Abstract】: Publish/subscribe (pub/sub) is a popular communication paradigm in the design of large-scale distributed systems. A provider of a pub/sub service (whether centralized, peer-assisted, or based on a federated organization of cooperatively managed servers) commonly faces a fundamental challenge: given limited resources, how to maximize the satisfaction of subscribers? We provide, to the best of our knowledge, the first formal treatment of this problem by introducing two metrics that capture subscriber satisfaction in the presence of limited resources. This allows us to formulate matters as two new flavors of maximum coverage optimization problems. Unfortunately, both variants of the problem prove to be NP-hard. By subsequently providing formal approximation bounds and heuristics, we show, however, that efficient approximations can be attained. We validate our approach using real-world traces from Spotify and show that our solutions can be executed periodically in real-time in order to adapt to workload variations.

【Keywords】: distributed processing; message passing; middleware; optimisation; capacity constraints; communication paradigm; cooperatively managed servers; formal approximation bounds; formal treatment; large-scale distributed systems; maximum coverage optimization problems; pub-sub systems; publish-subscribe systems; subscriber satisfaction; Approximation methods; Computer architecture; Computers; Linear programming; Measurement; Servers; TV

PA2: Performance analysis and modelling 2 4

289. Delay-throughput tradeoff with correlated mobility of ad-hoc networks.

Paper Link】 【Pages】:2589-2597

【Authors】: Shuochao Yao ; Xinbing Wang ; Xiaohua Tian ; Qian Zhang

【Abstract】: We analyze the scaling law in wireless ad hoc networks with the correlated mobility model. The former work about correlated mobility has shown the maximum throughput and the corresponding delay of several sub-cases, but the optimal throughput performances under various delay tolerant condition (the optimal delay-throughput tradeoff) remains open. We study the properties of correlated mobility model and establish the upper bound of delay-throughput tradeoff for several sub-cases. Then we find out an achievable lower bound by studying the optimal scheduling parameters and their constrains. We exploit the node correlation to achieve the delay-throughput tradeoff and give a picture that how node correlation impacts the packet delay, asymptotic throughput, and their tradeoff.

【Keywords】: ad hoc networks; delays; scheduling; asymptotic throughput; correlated mobility model; delay tolerant condition; delay-throughput tradeoff; lower bound; node correlation; optimal scheduling parameters; packet delay; scaling law; upper bound; wireless ad hoc networks; Conferences; Correlation; Delays; Relays; Throughput; Unicast; Upper bound

290. Joint power optimization of data center network and servers with correlation analysis.

Paper Link】 【Pages】:2598-2606

【Authors】: Kuangyu Zheng ; Xiaodong Wang ; Li Li ; Xiaorui Wang

【Abstract】: Data center power optimization has recently received a great deal of research attention. For example, server consolidation has been demonstrated as one of the most effective energy saving methodologies. Likewise, traffic consolidation has also been recently proposed to save energy for data center networks (DCNs). However, current research on data center power optimization focuses on servers and DCN separately. As a result, the optimization results are often inferior, because server consolidation without considering the DCN may cause traffic congestion and thus degraded network performance. On the other hand, server consolidation may change the DCN topology, allowing new opportunities for energy savings. In this paper, we propose PowerNetS, a power optimization strategy that leverages workload correlation analysis to jointly minimize the total power consumption of servers and the DCN. The design of PowerNetS is based on the key observations that the workloads of different servers and DCN traffic flows do not peak at exactly the same time. Thus, more energy savings can be achieved if the workload correlations are considered in server and traffic consolidations. In addition, PowerNetS considers the DCN topology during server consolidation, which leads to less inter-server traffic and thus more energy savings and shorter network delays. We implement PowerNetS on a hardware testbed composed of 10 virtual switches configured with a production 48-port OpenFlow switch and 6 servers. Our empirical results with Wikipedia, Yahoo!, and IBM traces demonstrate that PowerNetS can save up to 51.6% of energy for a data center. PowerNetS also outperforms two state-of-the-art baselines by 44.3% and 15.8% on energy savings, respectively. Our simulation results with 72 switches and 122 servers also show the superior energy efficiency of PowerNetS over the baselines.

【Keywords】: computer centres; computer network management; correlation methods; network servers; telecommunication network topology; telecommunication power management; telecommunication traffic; 48-port OpenFlow switch; DCN topology; DCN traffic; PowerNetS; correlation analysis; data center network; data center power optimization; data center servers; energy efficiency; energy saving methodologies; interserver traffic; network delays; network performance; power optimization strategy; server consolidation; traffic congestion; traffic consolidation; workload correlation analysis; Correlation; Joints; Network topology; Optimization; Power demand; Servers; Topology

291. Performance evaluation and asymptotics for Content Delivery Networks.

Paper Link】 【Pages】:2607-2615

【Authors】: Virag Shah ; Gustavo de Veciana

【Abstract】: Large scale Content Delivery Networks (CDNs) are one of the key components of today's information infrastructure. This paper proposes and analyzes a simple stochastic model for a file-server system wherein servers can work together, as a pooled resource, to meet individual user requests. In such systems basic questions include: How and where to replicate files? What is the impact of dynamic service allocation across request types, and whether it can provide substantial gains over simpler load balancing policies? What are tradeoffs amongst performance, reliability and recovery costs, and energy? The paper provides both explicit and asymptotic approximations for large systems towards addressing these basic questions.

【Keywords】: computer network performance evaluation; file servers; CDN; dynamic service allocation; file-server system; information infrastructure; large scale content delivery networks; load balancing policies; performance evaluation; stochastic model; Approximation methods; Computers; Conferences; Delays; Load modeling; Resource management; Servers

292. On the catalyzing effect of randomness on the per-flow throughput in wireless networks.

Paper Link】 【Pages】:2616-2624

【Authors】: Florin Ciucu ; Jens B. Schmitt

【Abstract】: This paper investigates the throughput capacity of a flow crossing a multi-hop wireless network, whose geometry is characterized by general randomness laws including Uniform, Poisson, Heavy-Tailed distributions for both the nodes' densities and the number of hops. The key contribution is to demonstrate how the per-flow throughput depends on the distribution of 1) the number of nodes Nj inside hops' interference sets, 2) the number of hops K, and 3) the degree of spatial correlations. The randomness in both Nj's and K is advantageous, i.e., it can yield larger scalings (as large as Θ(n)) than in non-random settings. An interesting consequence is that the per-flow capacity can exhibit the opposite behavior to the network capacity, which was shown to suffer from a logarithmic decrease in the presence of randomness. In turn, spatial correlations along the end-to-end path are detrimental by a logarithmic term.

【Keywords】: Poisson distribution; correlation methods; geometry; radio networks; telecommunication network reliability; Poisson distributions; catalyzing effect; general randomness laws; geometry; heavy-tailed distributions; interference sets; logarithmic term; multihop wireless network; network capacity; nonrandom settings; per-flow throughput; spatial correlations; throughput capacity; uniform distributions; Capacity planning; Correlation; Geometry; Interference; Relays; Spread spectrum communication; Throughput

SG1: Smart Grid 1 4

293. Greenbench: A benchmark for observing power grid vulnerability under data-centric threats.

Paper Link】 【Pages】:2625-2633

【Authors】: Mingkui Wei ; Wenye Wang

【Abstract】: Smart grid is a cyber-physical system which integrates communication networks into traditional power grid. This integration, however, makes the power grid susceptible to cyber attacks. One of the most distinguished challenges in studying the aftermath of cyber attacks in smart grid lies in data-centric threats. Even though such attacks are critical to the information network, they will result in much more Domino-like impact than they behave in cyber world. This is because for an information-centric network, distorted or delayed information undermines services and applications. But in power grid, these data-centric attacks may result in instable power systems, and further detrimental impact of power supplies. In this paper, we present Greenbench, a benchmark that is designed to evaluate real-time power grid dynamics in response to data-centric attacks. The simulation results provide several counter-intuitive suggestions to both smart grid security research and deployment.

【Keywords】: power system security; smart power grids; telecommunication networks; telecommunication security; Domino-like impact; communication networks; cyber attacks; cyber world; cyber-physical system; data-centric threats; greenbench; information-centric network; power grid vulnerability; power supplies; power systems; real-time power grid dynamic evaluation; smart grid security research; Green products; PSCAD; Smart grids; Smart meters; Synchronization

294. Power grid vulnerability to geographically correlated failures - Analysis and control implications.

Paper Link】 【Pages】:2634-2642

【Authors】: Andrey Bernstein ; Daniel Bienstock ; David Hay ; Meric Uzunoglu ; Gil Zussman

【Abstract】: We consider line outages in the transmission network of the power grid, and specifically those caused by natural disasters or large-scale physical attacks. In such networks, an outage of a line may lead to overload on other lines, thereby leading to their outage. Such a cascade may have devastating effects not only on the power grid but also on the interconnected communication networks. We study a model of such failures and show that it differs from other models used to analyze cascades (e.g., epidemic/percolation-based models). Inspired by methods developed for network-survivability analysis, we show how to identify the most vulnerable locations in the network. We also perform extensive numerical experiments with real grid data to estimate the effects of geographically correlated outages and briefly discuss mitigation methods. The developed techniques can indicate potential locations for grid monitoring, and hence, will have impact on the deployment of the smart-grid networking infrastructure.

【Keywords】: failure analysis; power transmission lines; power transmission reliability; smart power grids; geographically correlated failures; geographically correlated outage effects; grid monitoring; interconnected communication networks; large-scale physical attacks; line outages; mitigation methods; natural disasters; network-survivability analysis; power grid vulnerability; smart-grid networking infrastructure; transmission network; Analytical models; Computational modeling; Computers; Numerical models; Power grids; Power system faults; Power system protection; Cascading Failures; Geographically-Correlated Failures; Network Science; Power Grid; Survivability

295. Structure-aware stochastic load management in smart grids.

Paper Link】 【Pages】:2643-2651

【Authors】: Yu Zhang ; Mihaela van der Schaar

【Abstract】: Load management based on dynamic pricing has been advocated as a key approach for demand-side management in smart grids. By appropriately pricing energy, economic incentives are given to consumers to shift their usage away from peak hours, thereby limiting the amount of energy that needs to be produced. However, traditional pricing-based load management methods usually rely on the assumption that the statistics of the system dynamics (e.g. the time-varying electricity price, the arrival distribution of consumers' load demands) are known a priori, which is not true in practice. In this paper, we propose a novel price-dependent load scheduling algorithm which, unlike previous works, can operate optimally in systems where such statistical knowledge is unknown. We consider a power grid system where each consumer is equipped with an energy storage device that has the capability of storing electrical energy during peak hours. Specifically, we allow each consumer to proactively determine the amount of energy to purchase from the utility companies (or energy producers) while taking into consideration that its load demand and the electricity price dynamically vary over time in an a priori unknown manner. We first assume that all the dynamics are known and formulate the real-time load scheduling as a Markov decision process and systematically unravel the structural properties exhibited by the resulting optimal load scheduling policy. By utilizing these structural properties, we then prove that our proposed load scheduling algorithm can learn the system dynamics in an online manner and converge to the optimal solution. A distinctive feature of our algorithm is that it actively exploits partial information about the system dynamics so that less information needs to be learned than when using conventional reinforcement learning methods, which significantly improves the adaptation speed and the runtime performance. Our simulation results demonstrate that the proposed load sched- ling algorithm achieves efficiency by more than 30% compared to existing state-of-the-art online learning algorithms.

【Keywords】: Markov processes; demand side management; energy storage; learning (artificial intelligence); power engineering computing; power system economics; pricing; smart power grids; Markov decision process; adaptation speed improvement; demand-side management; dynamic pricing; economic incentives; energy pricing; energy storage device; optimal load scheduling policy; power grid system; price-dependent load scheduling algorithm; reinforcement learning methods; runtime performance improvement; smart grids; structure-aware stochastic load management; system dynamics; utility companies; Dynamic scheduling; Electricity; Energy storage; Heuristic algorithms; Power system dynamics; Pricing; Smart grids

296. Stochastic information management for voltage regulation in smart distribution systems.

Paper Link】 【Pages】:2652-2660

【Authors】: Hao Liang ; Atef Abdrabou ; Weihua Zhuang

【Abstract】: In this paper, we study distributed generation (DG) integration in smart grid, with a focus on the voltage regulation in smart distribution systems. To ensure the operation of a smart distribution system at an acceptable voltage level, voltage regulators are deployed at some strategic locations for voltage control. The two-way communication functionality of the smart distribution system is leveraged such that the voltage regulators are coordinated by a distribution substation. Based on the measurement reports from remote terminal units (RTUs) deployed at DG unit and load connection points, stochastic information management is performed by the distribution substation to address the randomness in renewable power generation and load demand. In this paper, we formulate a voltage regulation problem in the smart distribution system based on power flow analysis, while taking into account communication delays. We show that the problem can be represented as a partially observed Markov decision process (POMDP). Since voltage regulation is performed at a relatively low frequency to avoid excessive wear and tear on the voltage regulators, a large amount of measurements should be reported by the RTUs and processed by the distribution substation for optimal voltage regulation. In order to reduce the communication and computational overhead, we further investigate the voltage regulation problem and mathematically prove that a relatively small amount of information is sufficient for the distribution substation to make an optimal decision. The theoretical results are evaluated based on a case study of IEEE 13-bus test system with real DG power generation and demand data.

【Keywords】: Markov processes; distributed power generation; load flow; power distribution control; voltage control; communication delays; distributed generation integration; ditributed generator unit; load connection point; partially observed Markov decision process; power flow analysis; remote terminal unit; smart distribution systems; stochastic information management; voltage regulation; voltage regulator; Delays; Markov processes; Power generation; Regulators; Substations; Voltage control; Voltage measurement

SR1: Short range wireless technologies 1 4

297. SBVLC: Secure barcode-based visible light communication for smartphones.

Paper Link】 【Pages】:2661-2669

【Authors】: Bingsheng Zhang ; Kui Ren ; Guoliang Xing ; Xinwen Fu ; Cong Wang

【Abstract】: As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the screen of a smartphone. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones.

【Keywords】: Android (operating system); bar codes; electronic data interchange; mobile commerce; near-field communication; radiofrequency identification; smart phones; telecommunication security; 2D barcodes; Android smartphones; NFC technology; SBVLC; eavesdropping; geometric model; iOS smartphones; mobile payment; payments identification; personal identification; physical security enhancement mechanism; private information sharing; screen view angle manipulation; secure barcode-based visible light communication; secure data exchange scheme; secure device pairing; security sensitive application; security sensitive mobile application; user induced motion; Cameras; Decoding; Receivers; Security; Smart phones; Solid modeling; Three-dimensional displays

298. Frogeye: Perception of the slightest tag motion.

Paper Link】 【Pages】:2670-2678

【Authors】: Lei Yang ; Yong Qi ; Jianbing Fang ; Xuan Ding ; Tianci Liu ; Mo Li

【Abstract】: Existing methods in RFID systems often employ presence or absence fashion to detect the tags' motions, so they cannot meet motion detection requirement in many applications. Our recent observations suggest that the signal strength backscattered from the tag is hypersensitive to its position, inspiring us to perceive the tag motion through its radio signal strength changes. Motion perception is not trivial and challenged by weak stability of strength in that any other interference or noise may incur significant changes as well, resulting in high false positives. To tackle this issue, we propose to model the strength via the Mixture of Gaussian Model (MoG). The problem is thus converted to foreground segment in computer vision with the help of Strength Image, where the technique of MoG based background subtraction is employed. We then implement a prototype using commercial off-the-shelf products. The evaluation results show that the slightest tag motion (~ 10cm) can be precisely perceived, and the accuracy is up to 92.34% while the false positive is suppressed under 0.5%.

【Keywords】: Gaussian processes; mixture models; radiofrequency identification; Frogeye; MoG based background subtraction; RFID system; commercial off-the-shelf products; mixture of Gaussian model; motion perception; radio signal strength; signal strength backscattering; Computers; Conferences; Background substruction; Mixture of Gaussian Model; Motion detection; RFID

299. Sonar inside your body: Prototyping ultrasonic intra-body sensor networks.

Paper Link】 【Pages】:2679-2687

【Authors】: Giuseppe Enrico Santagati ; Tommaso Melodia

【Abstract】: Biomedical systems of implanted miniaturized sensors and actuators interconnected into an intra-body area network could enable revolutionary healthcare and clinical applications. Given the well-understood limitations of radio frequency (RF) propagation in the human body, in our previous work we investigated the use of ultrasonic waves as an alternative physical carrier of information [1], and proposed Ultrasonic WideBand (UsWB), an ultrasonic multipath-resilient integrated physical and medium access control (MAC) layer protocol [2]. In this paper, we discuss the design and implementation of a software-defined testbed architecture for ultrasonic intra-body area networks, and propose the first experimental demonstration of the feasibility of ultrasonic communications in biological tissues. We first discuss in detail our FPGA-based prototype implementation of UsWB. We then demonstrate how the prototype can flexibly trade performance off for power consumption, and achieve, for bit error rates (BER) no higher than 10-6, either (i) high-data rate transmissions up to 700 kbit/s at a transmit power of -14 dBm (≈ 40 μW), or (ii) low-data rate and lower-power transmissions down to -21dBm (≈ 8μW) at 70kbit/s. Finally, we show how the UsWB MAC protocol allows multiple transmitter-receiver pairs to coexist and dynamically adapt the transmission rate according to channel and interference conditions to maximize throughput while satisfying predefined reliability constraints.

【Keywords】: access protocols; biological tissues; biomedical telemetry; biomedical ultrasonics; body sensor networks; broadband networks; data communication; error statistics; multipath channels; power consumption; prosthetics; prototypes; radiowave propagation; telemedicine; ultrasonic propagation; BER; FPGA-based prototype implementation; MAC layer protocol; RF propagation limitations; UsWB MAC protocol; UsWB implementation; actuator interconnection; biological tissue ultrasonic communications; biomedical systems; bit error rates; channel conditions; clinical applications; design; healthcare; high-data rate transmissions; information carrier; interference conditions; low-data rate transmissions; lower-power transmissions; medium access control layer protocol; miniaturized sensor implantaion; multiple transmitter-receiver pairs; physical carrier; prototype performance; prototype power consumption; radiofrequency propagation limitations; reliability constraints; software-defined testbed architecture; sonar; throughput maximization; transmission rate; ultrasonic intrabody area network; ultrasonic intrabody sensor network prototyping; ultrasonic multipath-resilient integrated physical layer protocol; ultrasonic waves; ultrasonic wideband; Acoustics; Computer architecture; Field programmable gate arrays; Media Access Protocol; Phantoms; Radio frequency; Transducers

300. LiFi: Line-Of-Sight identification with WiFi.

Paper Link】 【Pages】:2688-2696

【Authors】: Zimu Zhou ; Zheng Yang ; Chenshu Wu ; Wei Sun ; Yunhao Liu

【Abstract】: Wireless LANs, especially WiFi, have been pervasively deployed and have fostered myriad wireless communication services and ubiquitous computing applications. A primary concern in designing each scenario-tailored application is to combat harsh indoor propagation environments, particularly Non-Line-Of-Sight (NLOS) propagation. The ability to distinguish Line-Of-Sight (LOS) path from NLOS paths acts as a key enabler for adaptive communication, cognitive radios, robust localization, etc. Enabling such capability on commodity WiFi infrastructure, however, is prohibitive due to the coarse multipath resolution with mere MAC layer RSSI. In this work, we dive into the PHY layer and strive to eliminate irrelevant noise and NLOS paths with long delays from the multipath channel responses. To further break away from the intrinsic bandwidth limit of WiFi, we extend to the spatial domain and harness natural mobility to magnify the randomness of NLOS paths while retaining the deterministic nature of the LOS component. We prototype LiFi, a statistical LOS identification scheme for commodity WiFi infrastructure and evaluate it in typical indoor environments covering an area of 1500 m2. Experimental results demonstrate an overall LOS identification rate of 90.4% with a false alarm rate of 9.3%.

【Keywords】: radiofrequency interference; wireless LAN; LiFi; Wi-Fi; harness natural mobility; harsh indoor propagation environment; line-of-sight identification; noise elimination; non-line-of-sight propagation; physical layer; wireless LAN; Bandwidth; Delays; Feature extraction; IEEE 802.11 Standards; Noise; Rician channels; Wireless communication

CR4: Cognitive radio networks 4 4

301. MIMO-based jamming resilient communication in wireless networks.

Paper Link】 【Pages】:2697-2706

【Authors】: Qiben Yan ; Huacheng Zeng ; Tingting Jiang ; Ming Li ; Wenjing Lou ; Y. Thomas Hou

【Abstract】: Reactive jamming is considered the most powerful jamming attack as the attack efficiency is maximized while the risk of being detected is minimized. Currently, there are no effective anti-jamming solutions to secure OFDM wireless communications under reactive jamming attack. On the other hand, MIMO has emerged as a technology of great research interest in recent years mostly due to its capacity gain. In this paper, we explore the use of MIMO technology for jamming resilient OFDM communication, especially its capability to communicate against the powerful reactive jammer. We first investigate the jamming strategies and their impacts on the OFDM-MIMO receivers. We then present a MIMO-based anti-jamming scheme that exploits interference cancellation and transmit precoding capabilities of MIMO technology to turn a jammed non-connectivity scenario into an operational network. Our testbed evaluation shows the destructive power of reactive jamming attack, and also validates the efficacy and efficiency of our defense mechanisms.

【Keywords】: MIMO communication; OFDM modulation; jamming; precoding; radio receivers; telecommunication security; MIMO-based jamming resilient communication; OFDM wireless communications; OFDM-MIMO receivers; antijamming scheme; interference cancellation; precoding; reactive jamming attack; wireless networks; Channel estimation; Decoding; Integrated circuits; Jamming; MIMO; OFDM; Receivers

302. CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks.

Paper Link】 【Pages】:2706-2714

【Authors】: Tsung Ying Wu ; Wanjiun Liao ; Cheng-Shang Chang

【Abstract】: Establishing control channels in a cognitive radio network (CRN) is an important and challenging problem. To cope with the problem of control channel saturation and the problem of channel blocking by primary users, channel hopping (CH) schemes are commonly used in the literature for control channel establishment in CRNs. There are three metrics that are widely used for evaluating the performance of CH schemes: (i) degree of overlapping (the number of distinct rendezvous channels), (ii) worst case time-to-rendezvous (TTR), and (iii) system load. In this paper, we focus on the symmetric and synchronous setting and propose a novel Cycle-Adjustable Channel Hopping (CACH) scheme that outperforms several existing CH schemes, including SSCH and QCH, in terms of the three metrics. The key idea of CACH is to create an additional layer of logical channels on the top of physical channels so that the cycle of channel hopping sequences can be adjusted to optimize system performance. The mathematic tools for our scheme are based on the operations in Galois fields that are more general than the prime number modular arithmetic used in SSCH. We show that CACH is much more general than SSCH and it can achieve the maximum degree of overlapping while allowing the worst case TTR to be adjustable. It is also much better than QCH in terms of reducing system load while keeping the same degree of overlapping and the same worst case TTR. Our simulation results show that CACH outperforms several existing schemes in many other aspects, including throughput, and robustness to the disturbance of PUs.

【Keywords】: cognitive radio; mathematical analysis; telecommunication control; wireless channels; CACH scheme; CH; CRN; TTR; channel blocking; channel hopping sequences; cognitive radio networks; control channel establishment; control channel saturation; cycle adjustable channel hopping; logical channels; mathematic tools; physical channels; primary users; time-to-rendezvous; Barium; Cognitive radio; Computers; Conferences; Galois fields; Hafnium; Measurement; Cognitive radio; Galois field; dynamic channel hopping; multiple rendezvous

303. A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks.

Paper Link】 【Pages】:2715-2723

【Authors】: Bo Gao ; Yaling Yang ; Jung-Min "Jerry" Park

【Abstract】: The coexistence of cognitive radio (CR) networks in the same swath of spectrum has become an increasingly important problem, which is especially challenging when coexisting networks are heterogeneous (i.e., use different air interface standards), such as the case in TV white spaces. In this paper, we propose a credit-token-based spectrum etiquette framework that enables spectrum sharing among distributed heterogeneous CR networks with equal priority. Specifically, we propose a game-auction coexistence framework. Each network acts as either an offerer or a requester, and coexists with other networks via a non-cooperative game and a truthful multi-winner auction. The framework addresses the trade-offs among social welfare and offerer's revenue in the auction and requester's utility in the game. We prove that the framework guarantees system stability. Our simulation results show that the proposed coexistence framework always converges to a near-optimal distributed solution and improves coexistence fairness and spectrum utilization.

【Keywords】: cognitive radio; game theory; TV white spaces; air interface standards; auction coexistence; credit-token-based spectrum etiquette framework; distributed heterogeneous CR networks; heterogeneous cognitive radio networks; near-optimal distributed solution; noncooperative game; spectrum swath; spectrum utilization; Computers; Cost accounting; Games; Pricing; Stability analysis; Switches; White spaces

304. Throughput-efficient channel allocation in multi-channel cognitive vehicular networks.

Paper Link】 【Pages】:2724-2732

【Authors】: You Han ; Eylem Ekici ; Haris Kremo ; Onur Altintas

【Abstract】: Recent studies show that the Dedicated Short Range Communication (DSRC) band allocated to vehicular networks is insufficient to carry the wireless traffic load generated by emerging applications for vehicular systems. A promising bandwidth expansion possibility presents itself through the release of large TV band spectra by FCC for cognitive access. One of the primary challenges of the so-called TV White Space (TVWS) access in vehicular networks is the design of efficient channel allocation mechanisms in face of high vehicular mobility and spatial-temporal variations of TVWS. In this paper, we address the channel allocation problem for multi-channel cognitive vehicular networks with the objective of system-wide throughput maximization. We show that the problem is a NP-hard combinatorial optimization problem, to which we present two solution approaches. We first propose a probabilistic polynomial-time (1 - 1/e)-approximation algorithm based on linear programming. Next, we prove that our objective function can be written as a submodular set function, based on which we develop a deterministic polynomial-time constant-factor approximation algorithm with a more favorable time complexity. Finally, we show the efficacy of our algorithms through numerical examples.

【Keywords】: channel allocation; cognitive radio; computational complexity; mobile radio; optimisation; polynomial approximation; road vehicles; telecommunication traffic; DSRC; FCC; NP-hard combinatorial optimization problem; TV band spectra; TV white space; TVWS access; bandwidth expansion possibility; channel allocation mechanism; cognitive access; dedicated short range communication; deterministic polynomial-time constant-factor approximation; high vehicular mobility; linear programming; multichannel cognitive vehicular network; probabilistic polynomial time approximation algorithm; spatial-temporal variation; submodular set function; system-wide throughput maximization; throughput-efficient channel allocation; time complexity; vehicular system application; wireless traffic load; Channel allocation; Ellipsoids; Linear programming; Polynomials; Throughput; Vehicles

MA2: Medium access control 2 4

305. Interference-aware proportional fairness for multi-rate wireless networks.

Paper Link】 【Pages】:2733-2741

【Authors】: Douglas M. Blough ; Giovanni Resta ; Paolo Santi

【Abstract】: In this paper, we consider how proportional fairness in wireless networks is impacted by spatial reuse and the interference it produces. We observe that, in scenarios where spatial reuse is possible (e.g., in high-density WLAN environments), the classic notion of time-based proportional fairness can be severely impacted: some users might experience very large interference penalties while other users might get larger bandwidth proportions than what they would have received with time-based proportional fairness and no spatial reuse. To account for this, we introduce the concept of interference-aware STDMA time-based proportional fairness (i-STPF), and compare it to ordinary STDMA time-based proportional fairness (STPF). We present an εi-STPF scheduling algorithm, and prove that it approximates the time-based fair bandwidth allocation (up to a small positive constant ε), while providing an aggregate throughput that is within a constant factor from optimal. We also present a heuristic i-STPF scheduling algorithm and compare it through simulation to a similar heuristic STPF scheduler, and to an interference-aware, rate-based scheduler. The results show that the i-STPF scheduler: i) achieves excellent aggregate throughput about 35% higher than rate-based throughput; and ii) maintains a close approximation to time-based fairness without interference.

【Keywords】: radiofrequency interference; scheduling; time division multiple access; wireless LAN; εi-STPF scheduling algorithm; aggregate throughput; bandwidth proportion; heuristic i-STPF scheduling algorithm; high-density WLAN environment; interference penalties; interference-aware STDMA time-based proportional fairness; interference-aware proportional fairness; interference-aware rate-based scheduler; multirate wireless networks; rate-based throughput; spatial reuse; time-based fair bandwidth allocation; Aggregates; Bandwidth; Interference; Schedules; Signal to noise ratio; Throughput; Wireless networks

306. FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver.

Paper Link】 【Pages】:2742-2750

【Authors】: Yan Zhang ; Loukas Lazos ; Kai Chen ; Bocan Hu ; Swetha Shivaramaiah

【Abstract】: We address the problem of improving the throughput and delay efficiency of distributed multi-channel MAC (MMAC) protocols. We design an MMAC protocol called FD-MMAC that exploits recent advances in full-duplex (FD) communications to coordinate channel access in a distributed manner. Compared with prior MMAC designs, the FD-MMAC protocol eliminates the use of in-band or out-of-band control channels for combating the multi-channel hidden terminal problem, discovering the resident channel of destinations, and performing load balancing. Furthermore, FD-MMAC improves the spectral efficiency by enabling the operation of multi-channel exposed terminals. To achieve its goals, FD-MMAC integrates an advanced suite of PHY-layer techniques, including self interference suppression, error vector magnitude and received power measurements, and signal correlation techniques. We validate the proposed PHY-layer techniques on NI USRP devices. Further, we show via simulations that FD-MMAC achieves significantly higher throughput and lower delay compared with prior art.

【Keywords】: access protocols; delays; interference suppression; radio networks; radio transceivers; resource allocation; FD-MMAC protocol; NI USRP devices; PHY-layer techniques; channel access; delay efficiency; distributed multichannel MAC protocols; error vector magnitude; full-duplex communication; in-band control channels; load balancing; low-power wireless environments; multichannel exposed terminals; multichannel hidden terminal problem; out-of-band control channels; received power measurements; resident channel; self interference suppression; signal correlation techniques; single transceiver; spectral efficiency; Computers; Conferences; Correlation; Delays; Load management; Protocols; Sensors

307. Competitive MAC under adversarial SINR.

Paper Link】 【Pages】:2751-2759

【Authors】: Adrian Ogierman ; Andréa W. Richa ; Christian Scheideler ; Stefan Schmid ; Jin Zhang

【Abstract】: This paper considers the problem of how to efficiently share a wireless medium which is subject to harsh external interference or even jamming. While this problem has already been studied intensively for simplistic single-hop or unit disk graph models, we make a leap forward and study MAC protocols for the SINR interference model (a.k.a. the physical model). We make two contributions. First, we introduce a new adversarial SINR model which captures a wide range of interference phenomena. Concretely, we consider a powerful, adaptive adversary which can jam nodes at arbitrary times and which is only limited by some energy budget. The second contribution of this paper is a distributed MAC protocol which provably achieves a constant competitive throughput in this environment: we show that, with high probability, the protocol ensures that a constant fraction of the non-blocked time periods is used for successful transmissions. Our results also highlight an inherent difference between the SINR model and unit disk graph models.

【Keywords】: access protocols; jamming; radiocommunication; MAC protocols; SINR interference model; adaptive adversary; adversarial SINR; competitive MAC; harsh external interference; jamming; unit disk graph model; wireless media; Aggregates; Interference; Media Access Protocol; Signal to noise ratio; TV

308. Optimal Rate Sampling in 802.11 systems.

Paper Link】 【Pages】:2760-2767

【Authors】: Richard Combes ; Alexandre Proutière ; Donggyu Yun ; Jungseul Ok ; Yung Yi

【Abstract】: Rate Adaptation (RA) is a fundamental mechanism in 802.11 systems. It allows transmitters to adapt the coding and modulation scheme as well as the MIMO transmission mode to the radio channel conditions, and in turn, to learn and track the (mode, rate) pair providing the highest throughput. So far, the design of RA mechanisms has been mainly driven by heuristics. In contrast, in this paper, we rigorously formulate such design as an online stochastic optimisation problem. We solve this problem and present ORS (Optimal Rate Sampling), a family of (mode, rate) pair adaptation algorithms that provably learn as fast as it is possible the best pair for transmission. We study the performance of ORS algorithms in stationary radio environments where the successful packet transmission probabilities at the various (mode, rate) pairs do not vary over time, and in non-stationary environments where these probabilities evolve. We show that under ORS algorithms, the throughput loss due to the need to explore sub-optimal (mode, rate) pairs does not depend on the number of available pairs. This is a crucial advantage as evolving 802.11 standards offer an increasingly large number of (mode, rate) pairs. We illustrate the efficiency of ORS algorithms (compared to the state-of-the-art algorithms) using simulations and traces extracted from 802.11 test-beds.

【Keywords】: MIMO communication; optimisation; stochastic processes; transmitters; wireless LAN; wireless channels; 802.11 systems; MIMO transmission mode; ORS; RA; coding scheme; modulation scheme; online stochastic optimisation problem; optimal rate sampling; packet transmission probabilities; radio channel conditions; rate adaptation; stationary radio environments; transmitters; Algorithm design and analysis; IEEE 802.11n Standard; MIMO; Optimization; Radio transmitters; Throughput

PA3: Performance analysis and modelling 3 4

309. Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility.

Paper Link】 【Pages】:2768-2776

【Authors】: Jiajia Liu ; Hiroki Nishiyama ; Nei Kato ; Jianfeng Ma ; Xiaohong Jiang

【Abstract】: Reference Point Group Mobility (RPGM) has been a practical mobility model used to efficiently capture the potential correlation among mobile nodes in many important applications. In this paper, we explore the throughput-delay tradeoff in a mobile ad hoc network (MANET) operating under the RPGM model and also a general setting of node moving speed. In particular, we consider a MANET with unit area and n nodes being divided evenly into Θ(nα) groups, α ∈ [0,1], where the center of each group moves according to a random direction model with speed no more than v ∈ [0,1]. We determine the regions of per node throughput, average delay and their tradeoffs that can be achieved (in order sense) in such a network. For the regime of v =0, we first prove that the per node throughput capacity is Θ(n-α/2), and then develop a routing scheme to achieve this capacity, resulting an average delay of Θ(max1/2, n1-α) for any α ∈ [0,1]. Regarding the regime of v > 0, we prove that the per node throughput capacity there can be improved to Θ(1), which is achievable by adopting a new routing scheme with an average delay of Θ(max{n1-α, na/2/v}) for v = o(1) and Θ(n) for v = Θ(1). The results in this paper help us to have a deep understanding on the fundamental performance scaling laws and also enable an efficient throughput-delay tradeoff to be achieved in MANETs with correlated mobility.

【Keywords】: mobile ad hoc networks; mobility management (mobile radio); telecommunication network routing; MANET; RPGM model; correlated mobility; mobile ad hoc networks; mobile nodes; reference point group; routing scheme; throughput capacity; throughput-delay tradeoff; Computers; Delays; Mobile ad hoc networks; Relays; Routing; Throughput; Upper bound

310. An approximation algorithm for client assignment in client/server systems.

Paper Link】 【Pages】:2777-2785

【Authors】: Yuqing Zhu ; Weili Wu ; James Willson ; Ling Ding ; Lidong Wu ; Deying Li ; Wonjun Lee

【Abstract】: One type of distributed systems is the client/server system consist of clients and servers. In order to improve the performance of such a system, client assignment strategy plays an important role. There are two criteria to evaluate the load on the servers - total load and load balance. The total load increases when the load balance decreases, vice versa. It has been proved that finding the best client assignment is NP-hard. In this paper, we propose a new model for the client assignment problem and design an algorithm based on Semidefinite programming (SDP). Our method has a (relaxed) performance ratio 0.87 when only 2 servers exist. In general case, our method becomes a heuristic, and the ratio of each iteration is 0.87. We are the first one to give these bounds. Our simulation results are compared with the state-of-art client assignment method, and our strategy outperforms it in terms of running time while keeps the load in similar level.

【Keywords】: client-server systems; mathematical programming; resource allocation; NP-hard problem; approximation algorithm; client assignment strategy; client-server systems; distributed systems; load balancing; semidefinite programming; server total load; Approximation algorithms; Clustering algorithms; Computer architecture; Computers; Educational institutions; Servers; Vectors

311. Sojourn time approximations in a multi-class time-sharing server.

Paper Link】 【Pages】:2786-2794

【Authors】: Ane Izagirre ; Urtzi Ayesta ; Ina Maria Verloop

【Abstract】: We study a multi-class time-sharing discipline with relative priorities known as Discriminatory Processor Sharing (DPS), which provides a natural framework to model service differentiation in systems. The analysis of DPS is extremely challenging and analytical results are scarce. We develop closed-form approximations for the mean conditional and unconditional sojourn times. The main benefits of the approximations lie in its simplicity, the fact that it applies for general service requirements with finite second moments, and that it provides insights into the dependency of the performance on the system parameters. We show that the approximation for the mean (un)conditional sojourn time of a customer is decreasing as its relative priority increases. We also show that the approximation is exact in various scenarios, and that it is uniformly bounded in the second moments of the service requirements. Finally we numerically illustrate that the approximation is accurate across a broad range of parameters.

【Keywords】: approximation theory; queueing theory; DPS; closed-form approximation; discriminatory processor sharing; finite second moments; mean conditional sojourn time; multiclass time-sharing server; queueing model; relative priority; service differentiation model; service requirements; sojourn time approximations; unconditional sojourn time; Computers; Conferences; Equations; Interpolation; Mathematical model; Numerical models

312. A general framework of hybrid graph sampling for complex network analysis.

Paper Link】 【Pages】:2795-2803

【Authors】: Xin Xu ; Chul-Ho Lee ; Do Young Eun

【Abstract】: Being able to capture the properties of massive real graphs and also greatly reduce data scale and processing complexity, graph sampling techniques provide an efficient tool for complex network analysis. Random walk-based sampling has become popular to obtain asymptotically uniform samples in the recent literature. However, it produces highly correlated samples and often leads to poor estimation accuracy in sampling large networks. Another widely-used approach is to launch random jump by querying randomly generated user/node ID, but also has the drawback of unexpected cost when the ID space is sparsely populated. In this paper, we develop a hybrid graph sampling framework that inherits the benefit of returning immediate samples from random walk-based crawling, while incorporating the advantage of reducing the correlation in the obtained samples from random jump. We aim to strike the right balance between random jump and crawling by analyzing the resulting asymptotic variance of an estimator of any graph nodal property, in order to give guidelines on the design of better graph sampling methods. We also provide simulation results on real network (graph) to confirm our theoretical findings.

【Keywords】: data reduction; graph theory; network theory (graphs); random processes; sampling methods; social networking (online); ID space; asymptotic variance analysis; complex network analysis; data processing complexity; data scale reduction; graph nodal property; hybrid graph sampling; hybrid graph sampling framework; massive real graphs; random jump; random walk-based crawling; Complex networks; Computers; Correlation; Eigenvalues and eigenfunctions; Estimation; Markov processes; Sampling methods

SG2: Smart Grid 2 4

313. Proactive fault-tolerant aggregation protocol for privacy-assured smart metering.

Paper Link】 【Pages】:2804-2812

【Authors】: Jongho Won ; Chris Y. T. Ma ; David K. Y. Yau ; Nageswara S. V. Rao

【Abstract】: Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively by using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.

【Keywords】: fault tolerance; smart meters; ciphertexts; communication efficiency; electricity consumption; fail-stop faults; privacy-assured smart metering; proactive fault-tolerant aggregation protocol; secret key sharing; Bandwidth; Fault tolerance; Fault tolerant systems; Noise; Privacy; Protocols; Smart meters

314. Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid.

Paper Link】 【Pages】:2813-2821

【Authors】: Fanxin Kong ; Chuansheng Dong ; Xue Liu ; Haibo Zeng

【Abstract】: The growing awareness about global climate change has boosted the need to mitigate greenhouse gas emissions from existing power systems and spurred efforts to accelerate the integration of renewable energy sources (e.g. wind and solar power) into the electrical grid. A fundamental difficulty here is that renewable energy sources are usually of high variability. The electrical grid must absorb this variability through employing many additional operations (e.g., operating reserves, energy storage), which will largely raise the cost of electricity from renewable energy sources. To make it affordable, numerous advancements in technologies and methods for the smart grid are required. In this paper, we will confine ourselves to one of them: how to plan the construction of wind farms with high capacity and low variability locally and distributedly. We first study the characteristics of both wind resources and wind turbines and present a more accurate wind power evaluation method based on Gaussian Regression. Then, we analyze a trade-off between wind power's quantity and quality and propose an approach to optimally combine different types of wind turbines to balance the trade-off for a specific site. Finally, we explore geographical diversity among different sites and develop an extended approach that jointly optimizes the combination of sites and turbine types. Extensive experiments using the realistic historical wind resource data are conducted for either of the local and distributed case. Encouraging results are shown for the proposed approaches and some interesting insights are also provided.

【Keywords】: Gaussian processes; power generation planning; power supply quality; regression analysis; smart power grids; wind power plants; wind turbines; Gaussian regression analysis; electrical smart grid; energy storage; geographical diversity; global climate change; greenhouse gas emission mitigation; historical wind resource data; operating reserve; power quality; power system; renewable energy source; solar power; wind farm construction plan; wind power; wind power evaluation method; wind turbine; Equations; Renewable energy sources; Wind power generation; Wind speed; Wind turbines

315. Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach.

Paper Link】 【Pages】:2822-2830

【Authors】: Dong-Hoon Shin ; Shibo He ; Junshan Zhang

【Abstract】: Wide-area monitoring, protection and control (WAMPAC) plays a critical role in smart grid, for protection against possible contingencies, by using the Supervisory Control and Data Acquisition (SCADA) system. However, a general consensus is that such a hierarchical system can be highly vulnerable to component (i.e., nodes and links) failures, calling for a robust and cost-effective communication system for smart grid. To this end, we consider a middleware approach to leverage the existing commercial communication infrastructure with abundant connectivity. In this approach, a natural question is how to use the middleware to cohesively “glue” the power grid and the commercial communication infrastructure together, in order to enhance robustness and cost-effectiveness. We tackle this problem while taking into consideration the multi-stage deployment of power devices and their redundant connections. We show that this problem can be cast as a minimum-cost middleware design under incremental deployment-an “online” problem where the input is provided gradually due to the incremental deployment. We design a randomized “online” algorithm, and show that it achieves the order-optimal average competitive ratio. Simulation results demonstrate the performance of our proposed algorithm, compared to the optimal offline solution.

【Keywords】: SCADA systems; middleware; power system control; power system measurement; power system protection; smart power grids; SCADA; architecture design; multi-stage middleware; power devices; smart grid communications; supervisory control and data acquisition system; Algorithm design and analysis; Logic gates; Middleware; Redundancy; Robustness; Sensors; Smart grids

316. Optimal Combined Heat and Power system scheduling in smart grid.

Paper Link】 【Pages】:2831-2839

【Authors】: Kan Zhou ; Jianping Pan ; Lin Cai

【Abstract】: Combined Heat and Power (CHP) systems are well known for their high efficiency and relatively low emissions. Existing CHP economic dispatch schemes do not use the energy buffer to minimize the average cost in the long term. Motivated by the queueing analysis and buffer management solutions in data communication systems, in this paper, we investigate how to use a battery pack and a water tank to optimize the average cost for the CHP systems by jointly considering the real-time electricity price, renewable energy generation, energy buffer states, etc. We first formulate the queueing models for the CHP systems, and then propose an algorithm based on the Lyapunov optimization technique which does not need any statistical information about the system dynamics. The optimal control actions are obtained by solving a non-convex optimization problem. We then discuss when it can be converted into a convex optimization problem. Since the battery pack queue and water tank queue are correlated by the CHP, the capacity relationship between them is further explored. Through the theoretical performance analysis, we also show the tradeoff between the cost saving and the energy buffer capacity. Finally, the effectiveness of the proposed algorithms is evaluated with practical data.

【Keywords】: cogeneration; power system economics; scheduling; smart power grids; Lyapunov optimization technique; battery pack queue; buffer management solutions; combined heat and power system scheduling; data communication systems; economic dispatch schemes; energy buffer states; nonconvex optimization problem; queueing analysis; real-time electricity price; renewable energy generation; smart grid; statistical information; water tank queue; Batteries; Cogeneration; Electricity; Natural gas; Optimization; Resistance heating; Storage tanks; Combined Heat and Power; Lyapunov Optimization; Smart Grid

SR2: Short range wireless technologies 2 3

Paper Link】 【Pages】:2840-2848

【Authors】: Yi Guo ; Lei Yang ; Bowen Li ; Tianci Liu ; Yunhao Liu

【Abstract】: Indoor navigation has received much attention in academics and industry in recent years. Previous methods often attempt to locate users with various localization algorithms in combination with an indoor map, so they need expensive infrastructures deployed in advance. In this study, we propose to utilize existing indoor objects attached RFID tags and the reader to navigate the user to the destination, without need of any extra hardware. The key insight is that the personal movement takes an impact on the Doppler frequency shift values collected from the indoor objects when getting close to the tag. Such local human-item spatial relation is leveraged to infer the users position and further navigate user to destination step by step. We implement a prototype navigation system, called RollCaller, and conduct comprehensive experiments to examine its performance.

【Keywords】: radiofrequency identification; Doppler frequency shift; RFID tags; RollCaller; extra hardware; human item spatial relation; indoor map; localization algorithms; user friendly indoor navigation system; users position; Antenna measurements; Antennas; Doppler effect; Frequency measurement; Navigation; Noise; Radiofrequency identification; Doppler Frequency Shift; Human-Item Spatial Relation; Indoor Navigation; RFID

318. BlueID: A practical system for Bluetooth device identification.

Paper Link】 【Pages】:2849-2857

【Authors】: Jun Huang ; Wahhab Albazrqaoe ; Guoliang Xing

【Abstract】: Despite the widespread use of Bluetooth technology, identity management of Bluetooth devices remains a significant challenge because the MAC address and name of Bluetooth device are easy to forge. In this paper, we present BlueID - a practical system that identifies Bluetooth devices by fingerprinting their clocks. Previous approaches to clock fingerprinting exclusively rely on the timestamps carried by packet headers, which can be easily spoofed by hacking the user-space device driver. In comparison, BlueID performs clock fingerprinting based on the temporal feature of Bluetooth frequency hopping, which is impossible to forge without a customized baseband. Due to the proprietary nature of chipset firmware that implements baseband on commodity Bluetooth devices, BlueID will significantly raise the bar of identity spoofing. Moreover, BlueID employs simple yet efficient techniques to detect and differentiate low power Bluetooth transmissions from a distance, making it suitable for mobile applications like energy efficient localization and tracking. BlueID is implemented on a low cost wireless development platform and extensively evaluated based on 56 commodity devices. We show that BlueID can detect Bluetooth radios from 100m away, and identify different devices with high accuracy, short delay, and low computational overhead. Although this paper focuses on Bluetooth, the design of BlueID is general and can be applied to other frequency hopping based wireless systems.

【Keywords】: Bluetooth; access protocols; computer crime; computer network management; computer network security; firmware; frequency hop communication; BlueID; Bluetooth device management; Bluetooth radio detection; MAC address; bluetooth device identification; chipset firmware; clock fingerprinting; commodity Bluetooth device; frequency hopping based wireless system; identity spoofing; low power Bluetooth transmission; mobile applications; packet header; timestamp; user space device driver hacking; Accuracy; Baseband; Bluetooth; Clocks; Noise; Wireless communication

319. Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding.

Paper Link】 【Pages】:2858-2866

【Authors】: Peng Guo ; Jiannong Cao ; Kui Zhang ; Xuefeng Liu

【Abstract】: Co-existing in the unlicensed ISM band, ZigBee transmissions can be significantly interfered by WiFi. Although several approaches recently are proposed to enable ZigBee transmission under WiFi interference, the ZigBee throughput still decreases to zero when WiFi throughput (generated by D-ITG) is over 8Mbps. In this paper, we propose a real-time (<; 5ms) adaptive transmission (RAT) scheme to efficiently adapt forward error-correction coding (FEC) on ZigBee devices in dynamic WiFi environment. We find that sizes of WiFi frames well follow the power law distribution model. With the model, corruption in ZigBee packets can be estimated to some extent, thus facilitating ZigBee device to choose a suitable FEC coding to maximize the throughput. Extensive experimental results show that, compared with existing works, RAT achieves significant performance improvement of ZigBee transmissions in WiFi environment with different traffic load. Particularly, the ZigBee throughput of RAT can be about 10kbps when the WiFi throughput is 8Mbps.

【Keywords】: Zigbee; adaptive codes; error correction codes; forward error correction; radiofrequency interference; wireless LAN; FEC; RAT scheme; Wi-Fi frame size; Wi-Fi interference; ZigBee devices; ZigBee packets; ZigBee throughput enhancement; dynamic WiFi environment; forward error-correction coding; power law distribution model; real-time adaptive coding; real-time adaptive transmission scheme; traffic load; unlicensed ISM band; Encoding; Forward error correction; IEEE 802.11 Standards; Interference; Real-time systems; Throughput; Zigbee