-
Establishing Trust in Online Advertising with Signed Transactions
Authors:
Antonio Pastor,
Rubén Cuevas,
Ángel Cuevas,
Arturo Azcorra
Abstract:
Programmatic advertising operates one of the most sophisticated and efficient service platforms on the Internet. However, the complexity of this ecosystem is a direct cause of one of the most important problems in online advertising, the lack of transparency. This lack of transparency enables subsequent problems such as advertising fraud, which causes billions of dollars in losses. In this paper w…
▽ More
Programmatic advertising operates one of the most sophisticated and efficient service platforms on the Internet. However, the complexity of this ecosystem is a direct cause of one of the most important problems in online advertising, the lack of transparency. This lack of transparency enables subsequent problems such as advertising fraud, which causes billions of dollars in losses. In this paper we propose Ads.chain, a technological solution to the lack-of-transparency problem in programmatic advertising. Ads.chain extends the current effort of the Internet Advertising Bureau (IAB) in providing traceability in online advertising through the Ads.txt and Ads.cert solutions, addressing the limitations of these techniques. Ads.chain is (to the best of the authors' knowledge) the first solution that provides end-to-end cryptographic traceability at the ad transaction level. It is a communication protocol that can be seamlessly embedded into ad-tags and the OpenRTB protocol, the de-facto standards for communications in online advertising, allowing an incremental adoption by the industry. We have implemented Ads.chain and made the code publicly available. We assess the performance of Ads.chain through a thorough analysis in a lab environment that emulates a real ad delivery process at real-life throughputs. The obtained results show that Ads.chain can be implemented with limited impact on the hardware resources and marginal delay increments at the publishers lower than 0.20 milliseconds per ad space on webpages and 2.6 milliseconds at the programmatic advertising platforms. These results confirm that Ads.chain's impact on the user experience and the overall operation of the programmatic ad delivery process can be considered negligible.
△ Less
Submitted 7 January, 2021; v1 submitted 13 May, 2020;
originally announced May 2020.
-
Measurement Errors in R
Authors:
Iñaki Ucar,
Edzer Pebesma,
Arturo Azcorra
Abstract:
This paper presents an R package to handle and represent measurements with errors in a very simple way. We briefly introduce the main concepts of metrology and propagation of uncertainty, and discuss related R packages. Building upon this, we introduce the 'errors' package, which provides a class for associating uncertainty metadata, automated propagation and reporting. Working with 'errors' enabl…
▽ More
This paper presents an R package to handle and represent measurements with errors in a very simple way. We briefly introduce the main concepts of metrology and propagation of uncertainty, and discuss related R packages. Building upon this, we introduce the 'errors' package, which provides a class for associating uncertainty metadata, automated propagation and reporting. Working with 'errors' enables transparent, lightweight, less error-prone handling and convenient representation of measurements with errors. Finally, we discuss the advantages, limitations and future work of computing with errors.
△ Less
Submitted 28 July, 2018; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Design and Analysis of 5G Scenarios with 'simmer': An R Package for Fast DES Prototy**
Authors:
Iñaki Ucar,
José Alberto Hernández,
Pablo Serrano,
Arturo Azcorra
Abstract:
Simulation frameworks are important tools for the analysis and design of communication networks and protocols, but they can result extremely costly and/or complex (for the case of very specialized tools), or too naive and lacking proper features and support (for the case of ad-hoc tools). In this paper, we present an analysis of three 5G scenarios using 'simmer', a recent R package for discrete-ev…
▽ More
Simulation frameworks are important tools for the analysis and design of communication networks and protocols, but they can result extremely costly and/or complex (for the case of very specialized tools), or too naive and lacking proper features and support (for the case of ad-hoc tools). In this paper, we present an analysis of three 5G scenarios using 'simmer', a recent R package for discrete-event simulation that sits between the above two paradigms. As our results show, it provides a simple yet very powerful syntax, supporting the efficient simulation of relatively complex scenarios at a low implementation cost.
△ Less
Submitted 29 January, 2018;
originally announced January 2018.
-
On the Energy Efficiency of Rate and Transmission Power Control in 802.11
Authors:
Iñaki Ucar,
Carlos Donato,
Pablo Serrano,
Andres Garcia-Saavedra,
Arturo Azcorra,
Albert Banchs
Abstract:
Rate adaptation and transmission power control in 802.11 WLANs have received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently put into question. I…
▽ More
Rate adaptation and transmission power control in 802.11 WLANs have received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently put into question. In this paper, we address via analysis, simulation and experimentation the relation between throughput performance and energy efficiency in multi-rate 802.11 scenarios. We demonstrate the trade-off between these performance figures, confirming that they may not be simultaneously optimised, and analyse their sensitivity towards the energy consumption parameters of the device. We analyse this trade-off in existing rate adaptation with transmission power control algorithms, and discuss how to design novel schemes taking energy consumption into account.
△ Less
Submitted 9 July, 2017; v1 submitted 26 June, 2017;
originally announced June 2017.
-
$μ$Nap: Practical Micro-Sleeps for 802.11 WLANs
Authors:
Arturo Azcorra,
Iñaki Ucar,
Francesco Gringoli,
Albert Banchs,
Pablo Serrano
Abstract:
In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design $μ$Nap, a local standard-compliant energy-saving mechanism tha…
▽ More
In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design $μ$Nap, a local standard-compliant energy-saving mechanism that leverages micro-sleep opportunities inherent to the CSMA operation of 802.11 WLANs. This mechanism is backwards compatible and incrementally deployable, and takes into account the timing limitations of existing hardware, as well as practical CSMA-related issues (e.g., capture effect). According to the performance assessment carried out through trace-based simulation, the use of our scheme would result in a 57% reduction in the time spent in overhearing, thus leading to an energy saving of 15.8% of the activity time.
△ Less
Submitted 30 June, 2017; v1 submitted 26 June, 2017;
originally announced June 2017.
-
simmer: Discrete-Event Simulation for R
Authors:
Iñaki Ucar,
Bart Smeets,
Arturo Azcorra
Abstract:
The simmer package brings discrete-event simulation to R. It is designed as a generic yet powerful process-oriented framework. The architecture encloses a robust and fast simulation core written in C++ with automatic monitoring capabilities. It provides a rich and flexible R API that revolves around the concept of trajectory, a common path in the simulation model for entities of the same type.
The simmer package brings discrete-event simulation to R. It is designed as a generic yet powerful process-oriented framework. The architecture encloses a robust and fast simulation core written in C++ with automatic monitoring capabilities. It provides a rich and flexible R API that revolves around the concept of trajectory, a common path in the simulation model for entities of the same type.
△ Less
Submitted 5 December, 2017; v1 submitted 26 May, 2017;
originally announced May 2017.
-
Revisiting 802.11 Rate Adaptation from Energy Consumption's Perspective
Authors:
Iñaki Ucar,
Carlos Donato,
Pablo Serrano,
Andres Garcia-Saavedra,
Arturo Azcorra,
Albert Banchs
Abstract:
Rate adaptation in 802.11 WLANs has received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently put into question. In this paper, we address via ana…
▽ More
Rate adaptation in 802.11 WLANs has received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently put into question. In this paper, we address via analysis and experimentation the relation between throughput performance and energy efficiency in multi-rate 802.11 scenarios. We demonstrate the trade-off between these performance figures, confirming that they may not be simultaneously optimised, and analyse their sensitivity towards the energy consumption parameters of the device. Our results provide the means to design novel rate adaptation schemes that takes energy consumption into account.
△ Less
Submitted 30 September, 2016;
originally announced September 2016.
-
Exploring the Use of RPAs as 5G Points of Presence
Authors:
Javier Suarez,
Ivan Vidal,
Jaime Garcia-Reinoso,
Francisco Valera,
Arturo Azcorra
Abstract:
This paper presents an early exploration and preliminary results on the use of Remotely Piloted Aircrafts (RPA) as 5G points of presence. The use of RPAs in the 5G arena would enable a cost-effective deployment of functions over mobile nodes that could be integrated on demand into the programmable and unified 5G infrastructure, enhancing the capacity of the network to flexibly adapt to the particu…
▽ More
This paper presents an early exploration and preliminary results on the use of Remotely Piloted Aircrafts (RPA) as 5G points of presence. The use of RPAs in the 5G arena would enable a cost-effective deployment of functions over mobile nodes that could be integrated on demand into the programmable and unified 5G infrastructure, enhancing the capacity of the network to flexibly adapt to the particular service requirements in a geographical area. As a first step, we evaluate the feasibility and the cost, in terms of energy consumption, of using virtualisation techniques over resource-constrained aerial vehicle platforms, as a fundamental software technology in the evolution towards 5G. We complement this evaluation presenting a proof-of-concept that considers the use of these platforms to enable real-time 5G communications in emergency cases.
△ Less
Submitted 24 March, 2016;
originally announced March 2016.
-
Deseeding Energy Consumption of Network Stacks
Authors:
Iñaki Ucar,
Arturo Azcorra
Abstract:
Regular works on energy efficiency strategies for wireless communications are based on classical energy models that account for the wireless card only. Nevertheless, there is a non-negligible energy toll called "cross-factor" that encompasses the energy drained while a frame crosses the network stack of an OS.
This paper addresses the challenge of deepen into the roots of the cross-factor, desee…
▽ More
Regular works on energy efficiency strategies for wireless communications are based on classical energy models that account for the wireless card only. Nevertheless, there is a non-negligible energy toll called "cross-factor" that encompasses the energy drained while a frame crosses the network stack of an OS.
This paper addresses the challenge of deepen into the roots of the cross-factor, deseed its components and analyse its causes. Energy issues are critical for IoT devices. Thus, this paper conceives and validates a new comprehensive framework that enables us to measure a wide range of wireless devices, as well as multiple devices synchronously. We also present a rigorous methodology to perform whole-device energy measurements in laptops, a more generic and suitable device to perform energy debugging. Finally, and using this framework, we provide a collection of measurements and insights that deepens our understanding of the cross-factor.
△ Less
Submitted 24 November, 2015;
originally announced November 2015.
-
Understanding the Detection of View Fraud in Video Content Portals
Authors:
Miriam Marciel,
Ruben Cuevas,
Albert Banchs,
Roberto Gonzalez,
Stefano Traverso,
Mohamed Ahmed,
Arturo Azcorra
Abstract:
While substantial effort has been devoted to understand fraudulent activity in traditional online advertising (search and banner), more recent forms such as video ads have received little attention. The understanding and identification of fraudulent activity (i.e., fake views) in video ads for advertisers, is complicated as they rely exclusively on the detection mechanisms deployed by video hostin…
▽ More
While substantial effort has been devoted to understand fraudulent activity in traditional online advertising (search and banner), more recent forms such as video ads have received little attention. The understanding and identification of fraudulent activity (i.e., fake views) in video ads for advertisers, is complicated as they rely exclusively on the detection mechanisms deployed by video hosting portals. In this context, the development of independent tools able to monitor and audit the fidelity of these systems are missing today and needed by both industry and regulators.
In this paper we present a first set of tools to serve this purpose. Using our tools, we evaluate the performance of the audit systems of five major online video portals. Our results reveal that YouTube's detection system significantly outperforms all the others. Despite this, a systematic evaluation indicates that it may still be susceptible to simple attacks. Furthermore, we find that YouTube penalizes its videos' public and monetized view counters differently, the former being more aggressive. This means that views identified as fake and discounted from the public view counter are still monetized. We speculate that even though YouTube's policy puts in lots of effort to compensate users after an attack is discovered, this practice places the burden of the risk on the advertisers, who pay to get their ads displayed.
△ Less
Submitted 5 February, 2016; v1 submitted 31 July, 2015;
originally announced July 2015.
-
Greening File Distribution: Centralized or Distributed?
Authors:
Kshitiz Verma,
Gianluca Rizzo,
Antonio Fernández Anta,
Rubén Cuevas Rumín,
Arturo Azcorra
Abstract:
Despite file-distribution applications are responsible for a major portion of the current Internet traffic, so far little effort has been dedicated to study file distribution from the point of view of energy efficiency. In this paper, we present a first approach at the problem of energy efficiency for file distribution. Specifically, we first demonstrate that the general problem of minimizing ener…
▽ More
Despite file-distribution applications are responsible for a major portion of the current Internet traffic, so far little effort has been dedicated to study file distribution from the point of view of energy efficiency. In this paper, we present a first approach at the problem of energy efficiency for file distribution. Specifically, we first demonstrate that the general problem of minimizing energy consumption in file distribution in heterogeneous settings is NP-hard. For homogeneous settings, we derive tight lower bounds on energy consumption, and we design a family of algorithms that achieve these bounds. Our results prove that collaborative p2p schemes achieve up to 50% energy savings with respect to the best available centralized file distribution scheme. Through simulation, we demonstrate that in more realistic cases (e.g., considering network congestion, and link variability across hosts) we validate this observation, since our collaborative algorithms always achieve significant energy savings with respect to the power consumption of centralized file distribution systems.
△ Less
Submitted 18 November, 2011;
originally announced November 2011.
-
TorrentGuard: stop** scam and malware distribution in the BitTorrent ecosystem
Authors:
Michal Kryczka,
Ruben Cuevas,
Roberto Gonzalez,
Angel Cuevas,
Arturo Azcorra
Abstract:
In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to either…
▽ More
In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to either malware or scam websites. This creates a serious threat for the BitTorrent ecosystem. To address this issue, we present a new detection tool named TorrentGuard for the early detection of fake content. Based on our evaluation this tool may prevent the download of more than 35 millions of fake files per year. This could help to reduce the number of computer infections and scams suffered by BitTorrent users. TorrentGuard is already available and it can be accessed through both a webpage or a Vuze plugin.
△ Less
Submitted 19 April, 2012; v1 submitted 18 May, 2011;
originally announced May 2011.