The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While many institutions, whether industrial, academic, or governmental, satisfy their computing needs through public cloud providers, many others still manage their own resources, often as geographically distributed datacenters. Spare capacity from these geographically distributed datacenters could be offered to others, provided there were a mechanism to discover, and then request these resources...
In this paper we introduce a simple model of multi-market trading. An identical security trades on two independent trading platforms. Prices and quotes are connected only by the strategic behavior of traders. The experimental design varies the degree to which traders monitor and act on information from both markets. We report on the degree of integration between the two markets as measured by the...
Fine-grained traffic flow measurement, which provides useful information for network management tasks and security analysis, can be challenging to obtain due to monitoring resource constraints. The alternate approach of inferring flow statistics from partial measurement data has to be robust against dynamic temporal/spatial fluctuations of network traffic. In this paper, we propose an intelligent...
In this work, we propose a new Greedy Forward algorithm to perform routing and data aggregation in WSNs. Differently from current Greedy Forward algorithms, our approach takes advantage of a sink node capable of long-range communication and uses the RSSI (Received Signal Strength Indicator) of exchanged packets to aggregate and forward data. Based on this, we propose the GRDA (Greedy Routing and Data...
Modern cloud and data center platforms suffer failures and performance degradation from large traffic surges caused by both external (e.g., DDoS attacks) or internal (e.g., workload changes, operator errors, routing misconfigurations) factors. If not mitigated, traffic overload could have significant financial and availability implications for cloud providers. In this paper, we propose NetFuse, a...
Internet is composed of a large amount of autonomous systems (ASes). Border Gateway Protocol (BGP) is the de facto standard used to connect these ASes and exchange reachability information between them. The global BGP routing table size in default free zone (DFZ) grows fast due to many factors including IP address allocation, multihoming, and traffic engineering, etc. Increasing prefix fragments consume...
This paper proposes a purely passive method for inferring a congestion map of a network. The congestion map is computed using the congestion markings carried in existing traffic, and is continuously updated as traffic is received. Consequently, congestion changes can be tracked in a real-time fashion with zero traffic overhead. Unlike active congestion reporting methods, our novel passive method is...
In this paper we study the effect of sink location on aggregation through many random Wireless Sensor Network topologies based on tree construction. The key idea is to build the tree out from the sink, taking into account node's degree of connectivity, in order to elect the node with the highest degree of connectivity as a parent, and the node with lowest degree of connectivity as a leaf. The shortest...
RFD and MRAI are the only two built-in mechanisms in BGP router against unstable routes, they can however negatively impact the convergence. In this paper, we propose a churn aggregation approach CAGG to stabilize BGP routing without harming convergence. CAGG is based on the observation that AS PATH change is the dominant cause for BGP updates and only a small number of AS PATHs are explored by each...
In this paper we propose a QoS based routing protocol for wireless sensor network applications that support both periodic and event-based data reporting. A geographic routing mechanism combined with QoS support is used to forward packets in the network. Data is routed based on the packet type. To route packets with different priorities, multiple transmission queues are used. In choosing the next hop,...
Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. Previous research in the area has focused on deriving a placement of monitors across the network towards the end of maximizing the monitoring utility of the network operator for a given traffic routing...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the performance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly solves the problem in real network scenarios. In this...
Wireless sensor networks (WSNs) have many applications in industry and environmental monitoring where sensor nodes are deployed at fixed places for monitoring some phenomena. One of the commonly used deterministic deployment topologies is a rectangular grid. In a WSN reliability measure that considers the aggregate flow of sensor data into a sink node is formulated, and it has been shown that computing...
This demonstration shows ESAWN-NR in action, a protocol for authentic, yet efficient data aggregation in presence of malicious, compromised sensor nodes. ESAWN-NR does not only achieve authenticity of data aggregates, but also allows to prove forged aggregates coming from specific nodes. This allows easy exclusion of such nodes from the network.
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.