Networking and Internet Architecture (cs.NI)

  • PDF
    Link-flooding attack (LFA) has emerged as a serious threat to Internet which cuts off connections between legitimate hosts and targeted servers by flooding only a few links (e.g., target links). Several mechanisms have been proposed to mitigate LFA, however, they can only mitigate LFA passively after target links have been compromised by adversaries. Based on the fact that adversaries rely on network linkmap to launch LFA, in this paper, we propose an active LFA mitigation mechanism, called Linkbait, that actively mitigates LFA by providing a fake linkmap to adversaries. Inspired by Moving Target Defense (MTD), we propose a link obfuscation algorithm in Linkbait that selectively reroutes detecting flows to hide target links from adversaries and mislead them to consider some bait links as target links. By providing the faked linkmap to adversaries, Linkbait can actively mitigate LFA even without identifying bots and does not affect flows from legitimate hosts. In order to further reduce the junk traffic generated by adversaries from entering the network, we propose a bot detection algorithm in Linkbait that extracts unique traffic patterns from LFA and leverages Support Vector Machine to accurately distinguish bots from legitimate hosts. Finally, we evaluate the feasibility of implementing Linkbait in real Internet, and evaluate its performance by using both a real-world testbed and large-scale simulations. The analyses and experiments results demonstrate the effectiveness of Linkbait.
  • PDF
    -Recent advances in microelectronics have enabled the realization of Wireless Body Area Networks (WBANs). However , the massive growth in wireless devices and the push for interconnecting these devices to form an Internet of Things (IoT) can be challenging for WBANs; hence robust communication is necessary through careful medium access arbitration. In this paper, we propose a new protocol to enable WBAN operation within an IoT. Basically, we leverage the emerging Bluetooth Low Energy technology (BLE) and promote the integration of a BLE transceiver and a Cognitive Radio module (CR) within the WBAN coordinator. Accordingly, a BLE informs WBANs through announcements about the frequency channels that are being used in their vicinity. To mitigate interference, the superframe's active period is extended to involve not only a Time Division Multiple Access (TDMA) frame, but also a Flexible Channel Selection (FCS) and a Flexible Backup TDMA (FBTDMA) frames. The WBAN sensors that experience interference on the default channel within the TDMA frame will eventually switch to another Interference Mitigation Channel (IMC). With the help of CR, an IMC is selected for a WBAN and each interfering sensor will be allocated a time-slot within the (FBTDMA) frame to retransmit using such IMC.
  • PDF
    This paper analyzes the localization outage probability (LOP), the probability that the position error exceeds a given threshold, in randomly deployed wireless networks. Two typical cases are considered: a mobile agent uses all the neighboring anchors or select the best pair of anchors for self-localization. We derive the exact LOP for the former case and tight bounds for the LOP for the latter case. The comparison between the two cases reveals the advantage of anchor selection in terms of LOP versus complexity tradeoff, providing insights into the design of efficient localization systems.
  • PDF
    -- Within the Future Internet, a new trend is foreseen with the creation of overlay networks composed of residential gateways (i.e. Home-Box), leveraging their storage and upload capacity in order to achieve scalable and cost-efficient content distribution. In this paper, we highlight an architecture of such a home-box overlay for Video On Demand (VOD) services, in cooperation with a network-aware request redirection and content caching strategy that optimize the resource usage at both network and client side to reduce the overall distribution cost. The proposed system is compared to existing solutions through comprehensive simulations. The results demonstrate the strong advantage of introducing such a network-aware and popularity-based caching strategy in terms of cost reduction for VOD services, especially for Content Delivery Networks.
  • PDF
    Information management is one of the most significant issues in nowadays data centers. Selection of appropriate software, security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. Besides these factors, financial analysis of data center maintenance is another important aspect that needs to be considered. Data centers are mission-critical components of all large enterprises and frequently cost hundreds of millions of dollars to build, yet few high-level executives understand the true cost of operating such facilities. Costs are typically spread across the IT, networking, and facilities, which makes management of these costs and assessment of alternatives difficult. This paper deals with a research on multilevel analysis of data center management and presents an approach to estimate the true total costs of operating data center physical facilities, taking into account the proper management of the information flow.
  • PDF
    We outline a general framework to use coordinated multi-point (CoMP) transmission technology in downlink multi-cell non-orthogonal multiple access (NOMA) systems considering distributed power allocation at each cell. In this framework, CoMP transmission is used for users experiencing strong receive-signals from multiple cells while each cell adopts NOMA for resource allocation to its active users. After a brief review of the working principles of different CoMP schemes, we identify their applicability and necessary conditions for their use in downlink multi-cell NOMA system. After that, we discuss different network scenarios with different spatial distributions of users and study the applicability of CoMP schemes in these network scenarios. To the end, a numerical performance evaluation is carried out for the proposed CoMP-NOMA systems and the results are compared with those for conventional orthogonal multiple access (OMA)-based CoMP systems. The numerical results quantify the spectral efficiency gain of the proposed CoMP-NOMA models over CoMP-OMA. Finally, we conclude this article by identifying the potential major challenges in implementing CoMP-NOMA in future cellular systems.
  • PDF
    Wireless networking allows users to access information and services regardless of location and physical infrastructure. It is a fast growing technology due to its availability of wireless devices, flexibility, ease of installation and configuration. With this rapid expansion of information and Communication Technology (ICT), the consumption of energy is also increasing. In the early age of wireless technology, computing infrastructure focused on everywhere access, capacity and speed of technology. But now computing infrastructure should be energy efficient because, in wireless networking, devices are mostly powered by a battery that is a limited source of energy and is a challenge for the researchers. In computing infrastructure energy saving and environmental protection has become a global demand. This paper proposed a computing infrastructure based on green computing for energy efficient wireless networking. Further, some challenges and techniques like power consumption in network architecture, algorithm efficiency, virtualization, and dynamic power saving will be discussed to make energy efficient computing infrastructure.

Recent comments

Aram Harrow Mar 19 2013 02:59 UTC

The original quantum Pagerank paper used adiabatic evolution, and this one uses the Szegedy walk. I wonder how the methods compare.

Another thing I'd like someone to figure out at some point is whether these can be done using resources scaling like poly log(# vertices) for power law graphs. T

...(continued)