Privacy Preservation for Context Sensing on Smartphone
The proliferation of sensor-equipped smartphones has enabled an increasing number of context-aware applications that provide personalized services based on users' contexts. However, most of these applications aggressively collect users' sensing data ...
Offloading Massive Data Onto Passenger Vehicles: Topology Simplification and Traffic Assignment
Offloading is a promising technique for alleviating the ever-growing traffic load from infrastructure-based networks such as the Internet. Offloading consists of using alternative methods of transmission as a cost-effective solution for network ...
Making DPI Engines Resilient to Algorithmic Complexity Attacks
This paper starts by demonstrating the vulnerability of Deep Packet Inspection DPI mechanisms, which are at the core of security devices, to algorithmic complexity denial of service attacks, thus exposing a weakness in the first line of defense of ...
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their ...
Congestion Control for Vehicular Networks With Safety-Awareness
Vehicular safety applications require reliable and up-to-date knowledge of the local neighborhood. Under IEEE 802.11p, this is attained through single-hop broadcasts of safety beacons in the control channel. However, high transmission power and node ...
Towards Robust Surface Skeleton Extraction and Its Applications in 3D Wireless Sensor Networks
The in-network data storage and retrieval are fundamental functions of sensor networks. Among many proposals, geographical hash table GHT is perhaps most appealing as it is very simple yet powerful with low communication cost, where the key is to ...
Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems
Radio Frequency Identification RFID technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory tags. In ...
When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications
Many important network functions require online membership lookup against a large set of addresses, flow labels, signatures, and so on. This paper studies a more difficult, yet less investigated problem, called multi-set membership lookup, which ...
FUN Coding: Design and Analysis
Joint FoUntain coding and Network coding FUN is proposed to boost information spreading over multi-hop lossy networks. The novelty of our FUN approach lies in combining the best features of fountain coding, intra-session network coding, and cross-next-...
Effects of Content Popularity on the Performance of Content-Centric Opportunistic Networking: An Analytical Approach and Applications
Mobile users are envisioned to exploit direct communication opportunities between their portable devices, in order to enrich the set of services they can access through cellular or WiFi networks. Sharing contents of common interest or providing access ...
Automated Adversarial Testing of Unmodified Wireless Routing Implementations
Numerous routing protocols have been designed and subjected to model checking and simulations. However, model checking the design or testing the simulator-based prototype of a protocol does not guarantee that the implementation is free of bugs and ...
Load Balancing in Two-Tier Cellular Networks With Open and Hybrid Access Femtocells
Femtocell base station BS is a low-power, low-price BS based on the cellular communication technology. It is expected to become a cost-effective solution for improving the communication performance of indoor users, whose traffic demands are large in ...
Timed Consistent Network Updates in Software-Defined Networks
Network updates, such as policy and routing changes, occur frequently in software-defined networks SDNs. Updates should be performed consistently, preventing temporary disruptions, and should require as little overhead as possible. Scalability is ...
Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
Delay is an important metric to understand and improve system performance. While existing approaches focus on aggregated delay statistics in pre-programmed granularity and provide results such as average and deviation, those approaches may not provide ...
On the Distance-Sensitive and Load-Balanced Information Storage and Retrieval for 3D Sensor Networks
Efficient in-network information storage and retrieval is of paramount importance to sensor networks and has attracted a large number of studies while most of them focus on 2D fields. In this paper, we propose novel Reeb graph based information storage ...
Feedback-Based Path Failure Detection and Buffer Blocking Protection for MPTCP
A multipath TCP MPTCP is a promising protocol that has been standardized by the Internet Engineering Task Force to support multipath operations in the transport layer. However, although the MPTCP can provide multiple transmission paths and aggregate the ...
Scaling the Internet Routing System Through Distributed Route Aggregation
The Internet routing system faces serious scalability challenges due to the growing number of IP prefixes that needs to be propagated throughout the network. Although IP prefixes are assigned hierarchically and roughly align with geographic regions, ...
Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping
With the growth in number and significance of the emerging applications that require extremely low latencies, network operators are facing increasing need to perform latency measurement on per-flow basis for network monitoring and troubleshooting. In ...
How Good is Bargained Routing?
In the context of networking, research has focused on non-cooperative games, where the selfish agents cannot reach a binding agreement on the way they would share the infrastructure. Many approaches have been proposed for mitigating the typically ...
An Integrated Systematic Approach to Designing Enterprise Access Control
Today, the network design process remains ad hoc and largely complexity agnostic, often resulting in suboptimal networks characterized by excessive amounts of dependence and commands in device configurations. The unnecessary high configuration ...
CCDN: Content-Centric Data Center Networks
Data center networks continually seek higher network performance to meet the ever increasing application demand. Recently, researchers are exploring the method to enhance the data center network performance by intelligent caching and increasing the ...
Scalable Industry Data Access Control in RFID-Enabled Supply Chain
By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product particulars in transit. Participants along the supply chain share their product data to enable information exchange and ...
Routing and Spectrum Assignment in Elastic Filterless Optical Networks
- Emile Archambault,
- Nabih Alloune,
- Marija Furdek,
- Zhenyu Xu,
- Christine Tremblay,
- Ajmal Muhammad,
- Jiajia Chen,
- Lena Wosinska,
- Paul Littlewood,
- Michel P. Belanger
Elastic optical networking is considered a promising candidate to improve the spectral efficiency of optical networks. One of the most important planning challenges of elastic optical networks is the NP-hard routing and spectrum assignment RSA problem. ...
Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework
We develop a social group utility maximization SGUM framework for cooperative wireless networking that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing its individual utility or the ...
Intra-Frame Bidirectional Transmission in Networks of Visible LEDs
The optical antenna’s directionality of nodes forming a visible light communication VLC network, i.e., their field-of-view FOV, varies greatly from device to device. This encompasses wide FOVs of ambient light infrastructure and directional FOVs of ...
Adaptive Lookup of Open WiFi Using Crowdsensing
Open WiFi access points APs are demonstrating that they can provide opportunistic data services to moving vehicles. We present CrowdWiFi, a novel system to look up roadside WiFi APs located outdoors or inside buildings. CrowdWiFi consists of two ...