Loading...
Search for: communication-overhead
0.006 seconds
Total 25 records

    Distributed Optimal Control Based on an Efficient Method for Communication

    , M.Sc. Thesis Sharif University of Technology Karbasi, Ali (Author) ; Farhadi, Alireza (Supervisor)
    Abstract
    This thesis is concerned with an optimal trade-off between communication overhead and the number and size of neighborhoods in a distributed optimal control technique for large-scale systems that is based on the Jacobi iteration and two-layer architecture for communication. Although this method efficiently reduces computational overhead, continuous and proper data transfer between subsystems that are very often far from each other, is required to achieve an acceptable performance. However, limited transmission bandwidth and short communication range result in significant communication overhead. This causes significant time latency between measurement and applied calculated control actions,... 

    Design and Implementation of Distributed Dimensionality Reduction Algorithms under Communication Constraints

    , M.Sc. Thesis Sharif University of Technology Rahmani, Mohammad Reza (Author) ; Maddah Ali, Mohammad Ali (Supervisor) ; Salehkaleybar, Saber (Supervisor)
    Abstract
    Nowadays we are witnessing the emergence of machine learning in various applications. One of the key problems in data science and machine learning is the problem of dimensionality reduction, which deals with finding a mapping that embeds samples to a lower-dimensional space such that, the relationships between the samples and their properties are preserved in the secondary space as much as possible. Obtaining such mapping is essential in today's high-dimensional settings. Moreover, due to the large volume of data and high-dimensional samples, it is infeasible or insecure to process and store all data in a single machine. As a result, we need to process data in a distributed manner.In this... 

    GoSCAN: Decentralized scalable data clustering

    , Article Computing ; Volume 95, Issue 9 , 2013 , Pages 759-784 ; 0010485X (ISSN) Mashayekhi, H ; Habibi, J ; Voulgaris, S ; Van Steen, M ; Sharif University of Technology
    2013
    Abstract
    Identifying clusters is an important aspect of analyzing large datasets. Clustering algorithms classically require access to the complete dataset. However, as huge amounts of data are increasingly originating from multiple, dispersed sources in distributed systems, alternative solutions are required. Furthermore, data and network dynamicity in a distributed setting demand adaptable clustering solutions that offer accurate clustering models at a reasonable pace. In this paper, we propose GoScan, a fully decentralized density-based clustering algorithm which is capable of clustering dynamic and distributed datasets without requiring central control or message flooding. We identify two major... 

    Key splitting for random key distribution schemes

    , Article Proceedings - International Conference on Network Protocols, ICNP ; 2012 ; 10921648 (ISSN) ; 9781467324472 (ISBN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    2012
    Abstract
    A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication of other benign nodes. Thus the challenge is to enhance resilience of WSN to node capture, while maintaining the flexibility and low-cost features of RKD. We address this problem, without any special-purpose hardware, proposing a new and simple idea: key splitting. Our scheme does not increase... 

    Key splitting: Making random key distribution schemes resistant against node capture

    , Article Security and Communication Networks ; Volume 8, Issue 3 , 2015 , Pages 431-445 ; 19390114 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian Attari, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    A large number of random key pre-distribution (RKD) schemes have been proposed in the literature to secure wireless sensor network applications, relying on symmetric key cryptography. However, sensor nodes are exposed to physical compromise by adversaries, who target the symmetric keys stored at each node. With the stolen keys in their possession, the adversaries are then able to compromise communication links between benign nodes. Here, the big challenge arises: how to increase resilience of RKD schemes for wireless sensor networks to node capture, while maintaining the flexibility and low-cost features of RKD? We propose the idea of key splitting to address this problem, without the need... 

    Accelerating the Rijndael algorithm using custom instructions capability of Nios II in ODYSSEY

    , Article Proceedings - 2006 International Conference on Design and Test of Integrated Systems in Nanoscale Technology, IEEE DTIS 2006 ; 2006 , Pages 69-73 ; 0780397266 (ISBN); 9780780397262 (ISBN) Iraji, R ; Hessabi, S ; Moghadam, E. K ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    The ODYSSEY design methodology is an object-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these method calls are implemented in hardware functional units, while others are simply executed by a general-purpose processor. There is a communication overhead because functional units must communicate with each other and with the processor core. In this paper we utilize the custom instructions capability of Nios II processor to enhance the performance of our ASIP. Since these instructions are in the processor itself, there will be no communication overhead for using them. We analyze the performance of the... 

    Compressed coded distributed computing

    , Article IEEE Transactions on Communications ; Volume 69, Issue 5 , 2021 , Pages 2773-2783 ; 00906778 (ISSN) Elkordy, A. R ; Li, S ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Communication overhead is one of the major performance bottlenecks in large-scale distributed computing systems, in particular for machine learning applications. Conventionally, compression techniques are used to reduce the load of communication by combining intermediate results of the same computation task as much as possible. Recently, via the development of coded distributed computing (CDC), it has been shown that it is possible to enable coding opportunities across intermediate results of different computation tasks to further reduce the communication load. We propose a new scheme, named compressed coded distributed computing (in short, compressed CDC), which jointly exploits the above... 

    A New Blockchain Scalability Scheme Based on Sharding

    , M.Sc. Thesis Sharif University of Technology Hediehloo, Alireza (Author) ; Aref, Mohammad Reza (Supervisor) ; Mohajery, Javad (Co-Supervisor)
    Abstract
    Designing a scalable protocol for the blockchain will reduce transaction fees and increase the use of cryptocurrencies for financial transactions. Increasing scalability means that if the investment of nodes increases or the number of network nodes increases, the security of the protocol and the decentralization of the network will be maintained and its throughput will increase. In this thesis, with the aim of increasing scalability, the scaling methods of layer one and layer two are examined and compared, and it is shown that sharding is a better method to achieve scalability. In sharding, nodes are divided into several shards (clusters) and each shard manages its own blockchain. The... 

    Computation time analysis of a distributed optimization algorithm applied to automated irrigation networks

    , Article Proceedings of the IEEE Conference on Decision and Control ; Dec , 2013 , Pages 2193-2199 ; 01912216 (ISSN) ; 9781467357173 (ISBN) Farhadi, A ; Cantoni, M ; Dower, P. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2013
    Abstract
    This paper considers the computation time of two algorithms for solving a structured constrained linear optimal control problem with finite horizon quadratic cost within the context of automated irrigation networks. The first is a standard centralized algorithm based on the interior point method that does not exploit problem structure. The second is distributed and based on a consensus algorithm, not specifically tailored to account for system structure, but devised rather to facilitate the management of conflicting computational and communication overheads. It is shown that there is a significant advantage in terms of computation time in using the second algorithm in large-scale networks.... 

    Mining distributed frequent itemsets using a gossip based protocol

    , Article Proceedings - IEEE 9th International Conference on Ubiquitous Intelligence and Computing and IEEE 9th International Conference on Autonomic and Trusted Computing, UIC-ATC 2012 ; 2012 , Pages 780-785 Bagheri, M ; Mirian Hosseinabadi, S. H ; Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    2012
    Abstract
    Recently, there has been a growing attention in frequent itemset mining in distributed systems. In this paper, we present an algorithm to extract frequent itemsets from large distributed datasets. Our algorithm uses gossip as the communication mechanism and does not rely on any central node. In gossip based communication, nodes repeatedly select other random nodes in the system, and exchange information with them. Our algorithm proceeds in rounds and provides all nodes with the required support counts of itemsets, such that each node is able to extract the global frequent itemsets. For local iteration and generation of candidate itemsets, a trie data structure is used, which facilitates the... 

    An efficient group key management protocol using code for key calculation: CKC

    , Article Telecommunication Systems ; Volume 51, Issue 2-3 , 2012 , Pages 115-123 ; 10184864 (ISSN) Hajyvahabzadeh, M ; Eidkhani, E ; Mortazavi, S. A ; Nemaney Pour, A ; Sharif University of Technology
    2012
    Abstract
    This paper presents a new group key management protocol, CKC (Code for Key Calculation) for secure IP multicast. In this protocol which is based on logical key hierarchy, only the group key needs to be sent to new member at join. Then, using the group key current members and the new member calculate the necessary keys by node codes and one-way hash function. A node code is a random number assigned to each node to help users calculate necessary keys. Again, at leave server just sends the new group key to the remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results... 

    Security and searchability in secret sharing-based data outsourcing

    , Article International Journal of Information Security ; Volume 14, Issue 6 , November , 2015 , Pages 513-529 ; 16155262 (ISSN) Hadavi, M. A ; Jalili, R ; Damiani, E ; Cimato, S ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared... 

    Distributed model predictive control with hierarchical architecture for communication: application in automated irrigation channels

    , Article International Journal of Control ; Volume 89, Issue 8 , 2016 , Pages 1725-1741 ; 00207179 (ISSN) Farhadi, A ; Khodabandehlou, A ; Sharif University of Technology
    Taylor and Francis Ltd 
    Abstract
    This paper is concerned with a distributed model predictive control (DMPC) method that is based on a distributed optimisation method with two-level architecture for communication. Feasibility (constraints satisfaction by the approximated solution), convergence and optimality of this distributed optimisation method are mathematically proved. For an automated irrigation channel, the satisfactory performance of the proposed DMPC method in attenuation of the undesired upstream transient error propagation and amplification phenomenon is illustrated and compared with the performance of another DMPC method that exploits a single-level architecture for communication. It is illustrated that the DMPC... 

    CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach

    , Article Telecommunication Systems ; Volume 62, Issue 4 , 2016 , Pages 657-674 ; 10184864 (ISSN) Hatamian, M ; Barati, H ; Movaghar, A ; Naghizadeh, A ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    Wireless sensor networks consist of a large number of nodes which are distributed sporadically in a geographic area. The energy of all nodes on the network is limited. For this reason, providing a method of communication between nodes and network administrator to manage energy consumption is crucial. For this purpose, one of the proposed methods with high performance, is clustering methods. The big challenge in clustering methods is dividing network into several clusters that each cluster is managed by a cluster head (CH). In this paper, a centralized genetic-based clustering (CGC) protocol using onion approach is proposed. The CGC protocol selects the appropriate nodes as CHs according to... 

    A lightweight key establishment scheme for wireless sensor networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009 ; Article number 5384737 , 2009 ; 9781424462735 (ISBN) Nikounia, S. H ; Amin, F ; Jahangir, A ; Sharif University of Technology
    Abstract
    Key predistribution in sensor networks refers to the problem of distributing secret keys among sensor nodes prior to deployment. Recently, many key predistribution schemes have been proposed for wireless sensor networks. To further improve these techniques, researchers have also proposed to use sensors' expected location information to help predistribution of keying materials. In this paper we propose a lightweight and scalable key establishment scheme for GPS-enabled wireless sensor networks. This scheme has little communication overhead and memory usage. Since communications and computations of key establishment schemes are done only once and when the network is begin initiated, actually... 

    A secure ECC-based privacy preserving data aggregation scheme for smart grids

    , Article Computer Networks ; Volume 129 , 2017 , Pages 28-36 ; 13891286 (ISSN) Vahedi, E ; Bayat, M ; Pakravan, M. R ; Aref, M. R ; Sharif University of Technology
    Abstract
    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don't usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time prevents smart meters from... 

    Fully distributed ECC-based key management for mobile ad hoc networks

    , Article Computer Networks ; Volume 113 , 2017 , Pages 269-283 ; 13891286 (ISSN) Gharib, M ; Moradlou, Z ; Doostari, M. A ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    Dynamic nature of mobile ad hoc networks combined with their lack of centralized infrastructure make security problem the most challenging issue in such networks. The main contribution of this paper is to propose a secure and efficient key management algorithm, able to satisfying the requirement of such networks and facing their specific characteristics. The proposed algorithm is a fully distributed ID-based system which is built based on elliptic curve cryptography. The main advantage of the proposed algorithm, that gives it the superiority in its field of research, is the improvement of the performance and the security strength together. The proposed algorithm is implemented with much... 

    On the security of an efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks

    , Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 510-514 ; 9781538649169 (ISBN) Kazemi, M ; Delavar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Design of anonymous authentication scheme is one of the most important challenges in Vehicular Ad hoc Networks (VANET). Most of the existing schemes have high computational and communication overhead and they do not meet security requirements. Recently, Azees et al. have introduced an Efficient Anonymous Authentication with Conditional Privacy-Preserving (EAAP) scheme for VANET and claimed that it is secure. In this paper, we show that this protocol is vulnerable against replay attack, impersonation attack and message modification attack. Also, we show that the messages sent by a vehicle are linkable. Therefore, an adversary can easily track the vehicles. In addition, it is shown that... 

    A Scalable architecture for monitoring IOT devices using ethereum and fog computing

    , Article 4th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2020, 16 September 2020 through 17 September 2020 ; 2020 , Pages 66-76 Tahmasebi, S ; Habibi, J ; Shamsaie, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With recent considerable developments in the Internet of Things (IoT), billions of resource-constrained devices are interconnected through the Internet. Monitoring this huge number of IoT devices which are heterogeneous in terms of underlying communication protocols and data format is challenging. The majority of existing IoT device monitoring solutions heavily rely on centralized architectures. Since using centralized architectures comes at the expense of trusting an authority, it has several inherent drawbacks, including vulnerability to security attacks, lack of data privacy, and unauthorized data manipulation. Hence, a new decentralized approach is crucial to remedy these drawbacks. One... 

    K-nearest neighbor search in peer-to-peer systems

    , Article AP2PS 2010 - 2nd International Conference on Advances in P2P Systems ; 2010 , Pages 100-105 ; 9781612081021 (ISBN) Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    Abstract
    Data classification in large scale systems, such as peer-to-peer networks, can be very communication-expensive and impractical due to the huge amount of available data and lack of central control. Frequent data updates pose even more difficulties when applying existing classification techniques in peer-to-peer networks. We propose a distributed, scalable and robust classification algorithm based on k-nearest neighbor estimation. Our algorithm is asynchronous, considers data updates and imposes low communication overhead. The proposed method uses a content based overlay structure to organize data and moderate the number of query messages propagated in the network. Simulation results show that...