428 research outputs found
Bridging today\u27s Internet Heterogeneity with a Content-oriented Approach
Despite the success of Internet technology and protocols, their deficiencies become apparent with growing and emerging applications like 3G mobile devices or pervasive environments. In these fields, there is a growing demand for additional support of mobility, multi- or anycast communication, or service composition. ..
Enabling Distributed Simulation of OMNeT++ INET Models
Parallel and distributed simulation have been extensively researched for a
long time. Nevertheless, many simulation models are still executed
sequentially. We attribute this to the fact that many of those models are
simply not capable of being executed in parallel since they violate particular
constraints. In this paper, we analyze the INET model suite, which enables
network simulation in OMNeT++, with regard to parallelizability. We uncovered
several issues preventing parallel execution of INET models. We analyzed those
issues and developed solutions allowing INET models to be run in parallel. A
case study shows the feasibility of our approach. Though there are parts of the
model suite that we didn't investigate yet and the performance can still be
improved, the results show parallelization speedup for most configurations. The
source code of our implementation is available through our web site at
code.comsys.rwth-aachen.de.Comment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch
(Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2,
2014, arXiv:1409.0093, 201
POSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a
conflict of privacy interests: Server-side localization violates location
privacy of the users, while localization on the user's device forces the
localization provider to disclose the details of the system, e.g.,
sophisticated classification models. We show how Secure Two-Party Computation
can be used to reconcile privacy interests in a state-of-the-art localization
system. Our approach provides strong privacy guarantees for all involved
parties, while achieving room-level localization accuracy at reasonable
overheads.Comment: Poster Session of the 7th ACM Conference on Security & Privacy in
Wireless and Mobile Networks (WiSec'14
Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding
High-coverage testing of sensornet applications is vital
for pre-deployment bug cleansing, but has previously been
difficult due to the limited set of available tools. We integrate
the KleeNet symbolic execution engine with the COOJA network
simulator to allow for straight-forward and intuitive
high-coverage testing initiated from a simulation environment.
A tight coupling of simulation and testing helps detect,
narrow down, and fix complex interaction bugs in an early
development phase. We demonstrate the seamless transition
between COOJA simulation and KleeNet symbolic execution.
Our framework enables future research in how high coverage
testing tools could be used in cooperation with simulation
tools
Poster: Accountable Processing of Reported Street Problems
Municipalities increasingly depend on citizens to file digital reports about
issues such as potholes or illegal trash dumps to improve their response time.
However, the responsible authorities may be incentivized to ignore certain
reports, e.g., when addressing them inflicts high costs. In this work, we
explore the applicability of blockchain technology to hold authorities
accountable regarding filed reports. Our initial assessment indicates that our
approach can be extended to benefit citizens and authorities in the future.Comment: Accepted as a poster abstract to CCS'2
ProMoX: A protocol stack monitoring framework
In this paper, we present a preliminary glance on our framework for
protocol stack monitoring using Xen (ProMoX). ProMoX uses the Xen hypervisor to virtualize entire instances of operating systems which may execute any arbitrary protocol implementation. By utilizing system virtualization for external monitoring, ProMoX can transparently inspect any protocol state and performance metrics of protocol implementations carried by a guest operating system. This way, ProMoX supports both the indentification of faults within early prototypes as well as the evaluation of new protocol designs
- …