DCNET 2011 Abstracts


Full Papers
Paper Nr: 14
Title:

MULTIPLE VECTOR CLASSIFICATION FOR P2P TRAFFIC IDENTIFICATION

Authors:

F. J. Salcedo-Campos

Abstract: The identification of P2P traffic has become a principal concern for the research community in the last years. Although several P2P traffic identification proposals can be found in the specialized literature, the problem still persists mainly due to obfuscation and privacy matters. This paper presents a flow-based P2P traffic identification scheme which is based on a multiple classification procedure. First, every traffic flow monitored is parameterized by using three different groups of features: time related features, data transfer features and signalling features. After that, a flow identification process is performed for each group of features. Finally, a global identification procedure is carried out by combining the three individual classifications. Promising experimental results have been obtained by using a basic KNN scheme as the classifier. These results provide some insights on the relevance of the group of features considered and demonstrate the validity of our approach to identify P2P traffic in a reliable way, while content inspection is avoided.

Paper Nr: 18
Title:

COMPUTATIONAL INTELLIGENCE APPLIED TO WILDFIRE PREDICTION USING WIRELESS SENSOR NETWORKS

Authors:

V. G. Gasull, D. F. Larios and J. Barbancho

Abstract: In this paper we present a novel algorithm, implemented in a wireless sensor network environment, for the study of fire in a natural environment. This algorithm can offer two kinds of information: the risk of a fire and, in case of an active fire, the propagation direction of the flames and their velocity. This information is useful for fire rangers in order to obtain escape ways and determine strategies for putting off the fire. The evaluation of the proposal algorithm is performed using an ad-hoc simulator. The preliminary results obtained show that the proposed algorithm is a promising method that can be used to solve the most common problems related to fire control and detection.

Paper Nr: 21
Title:

LOCALIZATION METHOD FOR LOW POWER CONSUMPTION SYSTEMS

Authors:

D. F. Larios and J. Barbancho

Abstract: Locating nodes is a fundamental problem in wireless networks with hundreds of devices deployed in a wide area. This is especially relevant for mobile nodes. Wireless sensor nodes are usually powered by small batteries, solar panels or piezoelectric generators, so that, and consequently, power consumption is the main constraint to deal with. But classic localization techniques do not consider the problem of energy consumption as a key point. This paper presents a novel low power and range-free localization technique based on distributed fuzzy logic and cooperative processing among a set of fixed nodes and its neighbours. This feature permits better accuracy with less power consumption than most relevant localization techniques.

Paper Nr: 27
Title:

MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH TRANSFORMATION

Authors:

Ajab Khan and Reiko Heckel

Abstract: The concept of super peer has been introduced to improve the performance of popular P2P VoIP applications. A super peer is the strongest peer in the network that has the capacity to act as a server for a set of VoIP clients. There is no doubt that by taking benefit of heterogeneity, super peer can do improve the efficiency, without compromising the decentralised nature of P2P networks. The core issue in the formation of super peer based overlay network is the selection of super peer among the participant peers. To solve this problem a number of solutions have been proposed in the literature. Generally, super peer are selected among the best nodes in the network, for example those with the most abondant resources, such as bandwidth, CPU cycles or memory. The next issue is when the peer shall be selected for this extended role either as when peer joins the network, or at any time during the session or promotion to super peer should be subject to requirements. In order to validate these approaches of super peer selection, simulation would be an ideal choice, but most existing simulation approaches cannot cope with unbounded dynamic changes of network topology. We propose an approach to modelling and simulation of P2P systems based on graph transformations, a visual rule based formalism that has recently been supported by facilities for stochastic modelling and simulation. We are considering a P2P VoIP applications such as Skype, we model three alternative solutions to the problem of peer promotion to super peers and evaluate these through simulation.

Short Papers
Paper Nr: 2
Title:

AN IMPROVED GMPLS SURVIVABILITY MECHANISM USING LINK DELAY-CONSTRAINED ALGORITHM

Authors:

Anastasios Bikos

Abstract: It is widely accepted that GMPLS (Generalized MPLS) will be a key technology in the evolution of the next generation of reliable Internet Protocol (IP) backbone networks. Conventional GMPLS-based optical-switching network fault recovery only provides resiliency in terms of path segment selection instead of constraint-based calculation. This can create severe impact on the protocol’s transport plane when a fault occurs to a link or path with many optical connections attached to it. This paper proposes the implementation of an improved GMPLS recovery algorithm based on the metric of optical link delay which is achieved through the pre or post selection of a safer and more stable protection path with fewer connections attached to it, and therefore with a lesser link delay metric compared to other possible paths. The improved recovery algorithm is evaluated using the network simulator ns-2 and more particularly a specialized simulator add-on for GMPLS, called ASONS (Automatically Switched Optical Network Simulator). The results indicate improved resiliency, increased fault avoidance, and reduced packet loss.

Paper Nr: 20
Title:

PERFORMANCE OF OPENDPI TO IDENTIFY TRUNCATED NETWORK TRAFFIC

Authors:

Jawad Khalife

Abstract: The identification of the nature of the traffic flowing through a TCP/IP network is a relevant target for traffic engineering and security related tasks. Traditional methods based on port assignments are no longer valid due to the use of ephemeral ports and ciphering. Despite the privacy concerns it arises, Deep Packet Inspection (DPI) is one of the most successful current techniques. Nevertheless, the performance of DPI is strongly limited by computational issues related to the huge amount of data it needs to handle, both in terms of number of packets and the length of the packets. This paper addresses the sensitivity of OpenDPI, one of the most powerful freely available DPI systems, when truncation of the payloads of the monitored traffic is applied. The results show that it is highly dependent on the protocol being monitored.

Paper Nr: 22
Title:

UTILIZING VIDEO ENCODING FOR POWER MANAGEMENT OVER WIRELESS NETWORKS

Authors:

C. Bouras and K. Stamos

Abstract: Power management is especially important in wireless networks because of the emergence of energy constrained mobile devices. This paper examines the ways that video encoding information can be used for more efficient power management. In particular, we propose and evaluate cross layer mechanisms that fine-tune transmission power depending on the video frame being encoded and we examine how this mechanism may be combined with algorithms that adjust transmission power based on feedback reports when TCP Friendly Rate Control (TFRC) is used as the transport protocol. Since typical video encoding uses frames of varying importance for the overall quality, this approach can improve received video quality and make better usage of available power.

Paper Nr: 26
Title:

ANOMALY DETECTION USING FIREFLY HARMONIC CLUSTERING ALGORITHM

Authors:

Mario H. A. C. Adaniya, Moises F. Lima and Lucas D. H. Sampaio

Abstract: The performance of communication networks can be affected by a number of factors including misconfiguration, equipments outages, attacks originated from legitimate behavior or not, software errors, among many other causes. These factors may cause an unexpected change in the traffic behavior, creating what we call anomalies that may represent a loss of performance or breach of network security. Knowing the behavior pattern of the network is essential to detect and characterize an anomaly. Therefore, this paper presents an algorithm based on the use of Digital Signature of Network Segment (DSNS), used to model the traffic behavior pattern. We propose a clustering algorithm, K-Harmonic means (KHM), combined with a new heuristic approach, Firefly Algorithm (FA), for network volume anomaly detection. The KHM calculate a weighting function of each point to calculate new centroids and circumventing the initialization problem present in most center based clustering algorithm and exploits the search capability of FA from escaping local optima. Processing the DSNS data and real traffic adata is possible to detect and point intervals considered anomalous with a trade-off between the 90% true-positive rate and 30% false-positive rate.

Paper Nr: 30
Title:

SIMILAR REGULAR PLANS FOR MOBILE CLIENTS

Authors:

John Tsiligaridis

Abstract: The broadcast problem including the plan design is considered. The data are inserted and numbered into customized size relations at a predefined order. The server ability to create a full, regular Broadcast Plan (RBP) with single and multiple channels, after some data transformations, is examined. The Basic Regular Algorithm (BRA) prepares an RBP and enables users to catch their items avoiding wasting energy of their devices. In the case of multiple channels, a dynamic grouping solution is proposed, called Full Partition Value Algorithm (FPVA) under a multiplicity constraint. The Similar Regular Plan Algorithm (SRPA) provides faster service of the supreme sets with the use of fewer channels. The combination of FPVA and SRPA provides flexibility for finding desired solutions. This last property, can be offered by servers today providing channel availability and lower energy consumption. Simulation results are provided.

Paper Nr: 31
Title:

OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper

Authors:

Manuel Koschuch, Matthias Hudler and Michael Krüger

Abstract: A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, manipulation and eavesdropping. Conventional cryptographic countermeasures against these kind of attacks cannot be readily applied in the context of sensor networks, due to the limited resources of the individual nodes. Since single nodes can be very easily captured and examined, symmetric schemes with the secret key present in every (or at least a subset of) node(s) pose quite a risk in this setting. In this work, we examine the applicability of threshold cryptographic techniques, especially the Gennaro-Rabin-Rabin multiparty multiplication protocol, for sensor networks by employing several optimizations to the different steps of this algorithm, building on previous results we obtained. We are able to improve the running time up to a factor of 6 compared to an unoptimized version for a bitlength of 1,024 Bit and 33 players.

Posters
Paper Nr: 5
Title:

RETHINKING ISP ARCHITECTURES THROUGH VIRTUALIZATION

Authors:

Alejandro Cordero and David Fernández

Abstract: Network virtualization is a powerful technology that has been proposed as a mean to evolve the current Internet, allowing the introduction and testing of future network technologies over present infrastructures in coexistence with our current production networks. However, apart from a path to the Future Internet, network virtualization can also be a key technology that modifies and improves today ISP networks. This paper analyses how network virtualization and all the technologies being developed around it can influence and evolve the present ISP network architectures and business models. Starting from the well-known ISP architecture made of access, distribution and core layer; we present and discuss the benefits that can be achieved by introducing virtualization technologies in each layer.

Paper Nr: 6
Title:

NETWORK PLANNING OF A VOIP-CABLE PBX - The Use of Data Profiling Techniques for an Efficient Network Planning

Authors:

Igor Ruiz-Agundez

Abstract: Network planning presents a number of difficulties and risks but performed in an optimal way may turn beneficial. In this work we address a new way of achieving optimal network planning for Voice over IP (VoIP) services by using historical data to profile service usage. We show how to obtain a sound set of service use clusters based on calling behaviours by applying a Simple Expectation Maximisation (EM) algorithm. We successfully evaluate this methodology with real data and extract useful knowledge that can result in an improved network planning. Finally, we discuss the application of this method to other network services.

Paper Nr: 11
Title:

SOFTWARE MODULES AND APPLICATION LAYER’S SECURITY STRUCTURE OF RSMAD

Authors:

Slawomir Gajewski and Malgorzata Gajewska

Abstract: The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer in the RSMAD system. What is more the paper highlights the advantages and disadvantages of the modular construction of ICT systems basing on the example of the RSMAD system.

Paper Nr: 24
Title:

APPLICATION-TRANSPARENT INTEGRATION OF SIMULATION TOOLS IN A WSN DEVELOPMENT ENVIRONMENT

Authors:

Juan Luis Font, Pablo Iñigo and Manuel Domínguez

Abstract: The use of simulation tools in the development of new Wireless Sensor Networks protocols and applications should be accompanied by minimisation of redundant code and work, making it possible to seamlessly run the same code on simulated and real platforms. This work proposes an architecture for a WSN testing platform that integrates simulation tools in an application-transparent way. The platform will be focused on testing the WSN sink node and providing it with both real and simulated data. The novelty of this approach lies in the use of a flexible network simulation tool not focused on a specific network technology, and the use of generic hardware and open source tools.

Paper Nr: 25
Title:

TECHNICAL VIABILITY STUDY FOR BEHAVIORAL MONITORING OF WILDLIFE ANIMALS IN DOÑANA - An 802.15.4 Coverage Study in a Natural Park

Authors:

M. Dominguez-Morales, A. Jimenez-Fernández, D. Cascado-Caballero, A. Linares-Barranco and R. Paz

Abstract: The study and monitoring of wildlife and in semi-freedom has always been a subject of great interest. In recent years the technology allows to design low cost systems that facilitate these tasks: microcontrollers, low-power wireless networks, sensors. GPS, satellite and VHF has been used for position tracking and localization of wildlife. Our aim is to design a low-cost system for local monitoring of wildlife (collar or harness) with local memory and remote access. It will use multiples sensors for behavioral and health monitoring and fuse the processed information locally to reduce the stored data, but allowing to be sporadically transmitted through wireless networks. This collar will be based on an embedded low-power microcontroller with 802.15.4 transceiver and a set of sensors to provide data (activity and health) of the animal under monitoring: accelerometers, compass, humidity, temperature, light, microphone, heart rhythm. This collar is called mote in wireless sensors network (WSN) terminology. Only when one mote is closer to an 802.15.4 mote and under request, the collar will dump the information to a host database server through the 802.15.4 network. In this paper we present a viability study of the WSN for Doñana Natural Park for different mote transmission powers, frequencies and distances for coverage. ZigBee and XBee mote has been proven.

Paper Nr: 29
Title:

ARCHITECTURE FOR ENVIRONMENTAL DATA ACCESS IN WSN

Authors:

J. M. Mora-Merchan, F. J. Molina, D. F. Larios and G. Rodriguez

Abstract: This paper shows different issues found in the real implementation of either a WSN or its data exploitation system for an environmental monitoring application. A generic software architecture for interfacing both is proposed and tested on a real case.