The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] priority queue(9hit)

1-9hit
  • Perfectly Secure Oblivious Priority Queue

    Atsunori ICHIKAWA  Wakaha OGATA  

     
    PAPER

      Pubricized:
    2022/08/23
      Vol:
    E106-A No:3
      Page(s):
    272-280

    An Oblivious Priority Queue (OPQ) is a cryptographic primitive that enables a client to outsource its data to a dishonest server, and also to securely manage the data according to a priority queue algorithm. Though the first OPQ achieves perfect security, it supports only two operations; Inserting an element and extracting the top-priority element, which are the minimal requirement for a priority queue. In addition, this OPQ allows an adversary to observe operations in progress, which leaks the exact number of elements in the data structure. On the other hand, there are many subsequent works for OPQs that implement additional operations of a priority queue, hide the running operations, and improve efficiency. Though the recent works realize optimal efficiency, all of them achieve only statistical or computational security. Aiming to reconcile perfect security of the first OPQ with all functions (including the operation hiding) supported by recent OPQs, we construct a novel perfectly secure OPQ that can simulate the following operations while hiding which one is in progress; Inserting an element, extracting the top-priority one, deleting an element, and modifying the priority of an element. The efficiency of our scheme is O(log2 N), which is larger than that of the best known statistically secure OPQ but is the same as the known perfectly secure scheme.

  • MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks

    Tao WANG  Hongchang CHEN  Chao QI  

     
    PAPER-Information Network

      Pubricized:
    2018/05/02
      Vol:
    E101-D No:10
      Page(s):
    2458-2464

    Software-defined networking (SDN) has rapidly emerged as a promising new technology for future networks and gained considerable attention from both academia and industry. However, due to the separation between the control plane and the data plane, the SDN controller can easily become the target of denial-of service (DoS) attacks. To mitigate DoS attacks in OpenFlow networks, our solution, MinDoS, contains two key techniques/modules: the simplified DoS detection module and the priority manager. The proposed architecture sends requests into multiple buffer queues with different priorities and then schedules the processing of these flow requests to ensure better controller protection. The results show that MinDoS is effective and adds only minor overhead to the entire SDN/OpenFlow infrastructure.

  • System Dwelling Times of Secondary Call in Cognitive Radio Systems

    Jungchae SHIN  Yutae LEE  Ho-Shin CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2170-2173

    In this paper, a preemptive priority queueing model is developed to derive the system dwelling time of secondary calls in a cognitive radio system in which a primary call's reoccupation of the channel is modeled as a preemptive event that forces a secondary call to attempt a spectrum handover. The suspension of secondary call service which may happen when the immediate spectrum handover fails, is included in our computation of the system dwelling time. The results are helpful in evaluating cognitive radio systems in terms of service delay and in determining system design parameters such as required buffer size and system capacity.

  • Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    Cheng-Min LIN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:8
      Page(s):
    2171-2175

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

  • Analysis and Modeling of a Priority Inversion Scheme for Starvation Free Controller Area Networks

    Cheng-Min LIN  

     
    PAPER-Software System

      Vol:
    E93-D No:6
      Page(s):
    1504-1511

    Control Area Network (CAN) development began in 1983 and continues today. The forecast for annual world production in 2008 is approximately 65-67 million vehicles with 10-15 CAN nodes per vehicle on average . Although the CAN network is successful in automobile and industry control because the network provides low cost, high reliability, and priority messages, a starvation problem exists in the network because the network is designed to use a fixed priority mechanism. This paper presents a priority inversion scheme, belonging to a dynamic priority mechanism to prevent the starvation problem. The proposed scheme uses one bit to separate all messages into two categories with/without inverted priority. An analysis model is also constructed in this paper. From the model, a message with inverted priority has a higher priority to be processed than messages without inverted priority so its mean waiting time is shorter than the others. Two cases with and without inversion are implemented in our experiments using a probabilistic model checking tool based on an automatic formal verification technique. Numerical results demonstrate that low-priority messages with priority inversion have better expression in the probability in a full queue state than others without inversion. However, our scheme is very simple and efficient and can be easily implemented at the chip level.

  • Designing a Packet Scheduler for Proportional Delay Differentiation Model

    Yi-Hung HUANG  Wang-Hsai YANG  

     
    PAPER-Network

      Vol:
    E90-B No:5
      Page(s):
    1098-1103

    We investigate the issues involved in designing a packet scheduler for the proportional delay differentiation (PDD) model in differentiated services (DiffServ) networks. The PDD model controls the average waiting time of each class such that the average waiting time is proportional to its corresponding delay differentiation parameter. This paper proposes a novel packet scheduler for PDD referred to as the longest waiting time first (LWTF). By adding certain conditions, we found that the LWTF scheduler can be reduced to a known packet scheduler-priority queue with linear priorities (PQ-LP). The properties and behaviors of LWTF can be predicted from the analysis of PQ-LP. The simulation results in comparison with other PDD algorithms have also revealed that LWTF provides no worse level of service quality in long timescales and affords more accurate and robust control over the delay ratio in short timescales.

  • Call Admission Control with QoS Class Modification

    Toshiaki TSUCHIYA  

     
    PAPER-Packet Transmission

      Vol:
    E86-B No:2
      Page(s):
    682-689

    In IP networks, QoS guarantee is becoming important, to allow real-time services such as voice over IP (VoIP) and video conferencing. To guarantee various QoS requirements from a variety of applications, call admission control (CAC) together with a service differentiation mechanism is useful. Service differentiation enables the network to provide different QoSs to various applications, by assigning priority classes to calls. Then, CAC limits the acceptance of new calls to prevent the QoSs of established calls from degrading. For this environment, we propose a CAC method in which priority classes assigned to already established calls are changed adaptively. Classes may be modified when the CAC function handles the acceptance of a new call if that can decrease the blocking probability. The effect of the method is shown by numerical examples.

  • Analysis of an ATM Multiplexer with Correlated Real-Time and Independent Non-real-time Traffic

    Chung-Ju CHANG  Jia-Ming CHEN  Po-Chou LIN  

     
    PAPER-Communication Networks and Service

      Vol:
    E77-B No:12
      Page(s):
    1521-1529

    This paper presents an alternative traffic model for an ATM multiplexer providing video, voice, image, and data services. The traffic model classifies the input traffic into two types: real-time and non-real-time. The input process for realtime traffic is periodic and correlated, while that for non-realtime traffic is batch Poisson and independent. This multiplexer is assumed to be a priority queueing system with synchronous servers operating on time-frame basis and with separate finite buffers for each type of traffic. State probabilities and performance measures are successfully obtained using a Markov analysis technique and an application of the residue theorem in complex variable. The results can be applied in the design of an ATM multiplexer.

  • Performance Analysis for a Two-Class Priority Queueing Model with General Decrementing Service

    Tsuyoshi KATAYAMA  

     
    PAPER

      Vol:
    E75-B No:12
      Page(s):
    1301-1307

    This paper investigates a two-class priority queue with decrementing service of a parameter (k1=, k2=k,1k) which operates as follows: Starting once a class-1 message service, a single server serves all messages in queue 1 until it becomes empty. After service completion in queue 1, the server switches over to queue 2 and continues serving messages in queue 2 until either queue 2 becomes empty, or the number of messages decreases to k less than that found upon the server's arrival at queue 2, whichever occurs first. It is assumed that arrival streams are Poissonian, message service times are generally distributed, and switch-over times are zero. We derive queue-length generating functions and LSTs of message waiting time distributions.