DCNET 2013 Abstracts


Full Papers
Paper Nr: 7
Title:

Some Synchronization Issues in OSPF Routing

Authors:

Anne Bouillard, Claude Jard and Aurore Junier

Abstract: A routing protocol such as OSPF has a cyclic behavior to regularly update its view of the network topology. Its behavior is divided into periods. Each period produces a flood of network information messages. We observe a regular activity in terms of messages exchanges and filling of receive buffers in routers. This article examines the consequences of possible overlap of activity between periods, leading to a buffer overflow. OSPF allows “out of sync” flows by considering an initial delay (phase). We study the optimum calculation of these offsets to reduce the load, while maintaining a short period to ensure a protocol reactive to topology changes. Such studies are conducted using a simulated Petri net model. A heuristic for determining initial delays is proposed. A core network in Germany serves as illustration.v

Paper Nr: 12
Title:

HyVVE - A Voronoi based Hybrid Architecture for Massively Multiplayer On-line Games

Authors:

Laura Ricci, Luca Genovali and Barbara Guidi

Abstract: Massively Multiplayer Online Games (MMOGs) have gained a lot of popularity in recent years. The problem of defining a proper architecture supporting MMOGs is still a research challenge because the classical client server architecture mainly adopted in commercial applications presents several drawbacks like unsatisfactory scalability and limited fault tolerance. This paper presents HyVVE (Hybrid Voronoi Virtual Environments), an hybrid architecture exploiting both server and P2P nodes. HyVVE exploits a Voronoi tessellation of the virtual world to distribute the load for the management of the virtual entities among the server and the peers. The paper presents a set of experimental results proving the effectiveness of our approach.

Short Papers
Paper Nr: 4
Title:

Evaluation of Video Transmission in Emergency Response Ad Hoc Networks

Authors:

C. Bouras, G. Kioumourtzis, A. Gkamas, V. Kapoulas, D. Politaki and E. Tsanai

Abstract: Mobile Ad hoc NETworks (MANETs) are becoming more essential to wireless communications due to growing popularity of mobile devices. MANETs are also essential in Emergency Response situation where network information flow between deployed units is vital. In such cases voice and video transmission is essential to form a global view of the situation and decide on action. However, MANETs do not seem to effectively support multimedia applications and especially video transmission. In this work we evaluate the use of multiple interfaces and multiple channels for Video Transmission in Emergency Response Ad hoc Networks. We also evaluate the video transmission with rate adaptation. Aim of this paper is to tune multi-interfaces and multi-channels video transmission mechanisms in order to support better emerging situations and offer a solution to have acceptable transmission of the necessary video streams so that the control can get a complete overall picture of the situation and decide on the action to be taken. The simulation evaluation performed shows that multi-interfaces and multi-channels video transmission offers many advantages in Video Transmission in Emergency Response Ad hoc Networks.

Paper Nr: 8
Title:

Resource-aware Virtualization for Industrial Networks - A Novel Architecture Combining Resource Management, Policy Control and Network Virtualization for Networks in Automation or Supervisory Control and Data Acquisition Networks

Authors:

Hans-Peter Huth and Amine M. Houyou

Abstract: Within the EU Project IoT@Work future Internet techniques such as network virtualization are investigated in order to provide communication services in automation systems. The physical network is modeled as an abstract pool of resources that is allocated through virtual slices to different automation applications. Each slice of the network resources fulfils the application communication needs in terms of security, QoS, and reliability. The proposed architecture is targeted at constrained networks, where a centralized control and management point could be accessed through an API to create and implement virtual networks which could be mapped to a real physical infrastructure. This approach would impact not only the task of engineering by separating application programming from configuring networks. It also hides the network dynamics and self-management connecting ever more dynamic, adaptive and smart automation systems.

Paper Nr: 9
Title:

Token-based Authentication for Smartphones

Authors:

Manuel Koschuch, Matthias Hudler, Hubert Eigner and Zsolt Saffer

Abstract: Due to short - but frequent - sessions of smartphone usage, the fast and easy usability of authentication mechanisms in this special environment has a big impact on user acceptance. In this work we propose a user-friendly alternative to common authentication methods (like PINs and patterns). The advantages of the proposed method are its security, fastness, and easy usage, requiring minimal user interaction compared to other authentication techniques currently used on smartphones. The mechanism described uses the presence of a Bluetooth-connected hardware-token to authenticate the user and can easily be implemented on current smartphones. It is based on an authentication protocol which meets the requirements on energy efficiency and limited resources by optimizing the communication effort. A prototype was implemented on an Android smartphone and an MSP430 based MCU. The token allows fast authentication without the need for additional user action. The entire authentication process can be completed in less than one second, the developed software prototype requires no soft- or hardware modifications (like rooting) of the Android phone.

Paper Nr: 14
Title:

A New Approach for Detection of Host Identity in IPv6 Networks

Authors:

Libor Polcák, Martin Holkovič and Petr Matousek

Abstract: For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it is in IPv4. This paper presents a new approach to track IPv6 address assignments in LANs. The method is based on a study of implementation of IPv6 (mainly neighbor discovery) in current operating systems. The detection is passive for end devices and does not require any software or hardware modifications. In contrast with current methods, our approach does not poll routers in the network and works also in networks where IPv6 multicast is not broadcasted (active Multicast Listener Discovery snooping – MLD snooping). Moreover, our approach detects that an address is no longer used. The approach was successfully tested in a campus network.

Posters
Paper Nr: 6
Title:

A Novel Technique for TCP based Congestion Control

Authors:

Martin Hruby, Michal Olsovsky and Margareta Kotocova

Abstract: Network performance increase does not have to be associated only with the upgrade of existing infrastructure and devices. More effective and less expensive increase of network performance can be achieved via sophisticated improvement of existing protocols, mainly at network and transport layer. The aim of this paper is to introduce our new approach for solving network performance issues which occur mostly due to congestion. New approach called Advanced Notification Congestion System (ACNS) allows TCP flows prioritization based on the TCP flow age and carried priority in the header of the network layer protocol. The main aim is to provide more bandwidth for young and high prioritized TCP flows by means of penalizing old greedy flows with a low priority. Using ACNS, substantial network performance increase can be achieved.

Paper Nr: 17
Title:

Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions

Authors:

Manuel Koschuch, Matthias Hudler and Zsolt Saffer

Abstract: Cryptographic hash functions are an important building block used in many cryptosystems. The flexibility and ability of a system designer to choose the most fitting function for a given system enables fast, efficient and secure designs. In this position paper we give preliminary results of porting three selected hash algorithms to Iris and MicaZ Sensor nodes in terms of achieved performance, memory requirements and the influence of different compiler optimizations on these measurements. Our main goal is to provide a sort of baseline approximation of how much effort is needed to port reference code of these algorithms to a new platform without trying to optimize it, leaving all this work to the compiler; enabling designers to not having to stick to already ported algorithms, when they might be suboptimally suited for a given environment.