{"title":"Security mechanism for distribution automation using EPON","authors":"Zhongwei Sun, Yaning Ma, Qingrui Guo, Fengjie Sun","doi":"10.1109/ICNIDC.2009.5360954","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360954","url":null,"abstract":"In electrical power industry, a reliable communication network constitutes the core of the distribution automation system (DAS). This paper first proposes a novel communication method for distribution automation using Ethernet Passive Optical Networks (EPON). Then, based on the symmetric cryptographic techniques, a secure DAS communication architecture is presented. Following the standard registration procedure, the mutual device authentication between the OLT and the ONU is finally implemented.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Roboid component for Player/Stage Robot Simulator","authors":"Jun Won Lim, Sanghoon Lee, I. Suh, Kyung Jin Kim","doi":"10.1109/ICNIDC.2009.5360909","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360909","url":null,"abstract":"Simulation environment is very useful as it provides ground to virtually embody robots in the designing stage. There will be applied Player/Stage, one of the robot simulation and control environments, to Roboid Studio which is a component-based framework. Here, robots are controlled based on simulacrum. Several issues will be discussed to get Player/Stage to work as a component for Roboid Studio.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel scheme for the transmission of P2P service in the broadband access network","authors":"Dongchao Ma, Xue Chen, Ning Wang, N. Zhang","doi":"10.1109/ICNIDC.2009.5360851","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360851","url":null,"abstract":"This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory-efficient regular expression matching for Chinese network content audit","authors":"Zezhi Zhu, Ping Lin, Luying Chen, Kun Zhang","doi":"10.1109/ICNIDC.2009.5360785","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360785","url":null,"abstract":"When match against Chinese keyword for network content audit, one of the biggest problems is that there is interference of “noise characters”, it makes the traditional way using explicit string pattern to match infeasible. Regular expression matching can solve the problem perfectly, but the DFA-base approaches for regular expression matching will also encounter the problem of excessive memory usage. In this paper, we try to solve the problem encountered when applying regular expression to Chinese network content audit. We propose a regular expression rewriting techniques and grouping principle that can solve excessive memory usage problem in DFA-based approach. Our solution can make it possible to apply regular expression to Chinese network content audit.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bi-direction adjustable token bucket mechanism for multi-class bandwidth guarantee and sharing","authors":"Dazhong He, Wenli Zhou, Xiang Zhang","doi":"10.1109/ICNIDC.2009.5360808","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360808","url":null,"abstract":"In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class token bucket mechanism is presented to achieve this goal. Furthermore, experiments and tests have proved that this solution is effective.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved SEND protocol against DoS attacks in Mobile IPv6 environment","authors":"Meigen Huang, Jianrong Liu, Yunjie Zhou","doi":"10.1109/ICNIDC.2009.5360962","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360962","url":null,"abstract":"Neighbor Discovery protocol can be used to communicate between neighboring nodes in the Mobile IPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, Denial-of-Service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of Secure Neighbor Discovery protocol in Mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User behaviors in an Online Social Network","authors":"Dan Guo, Fuhong Lin, Changjia Chen","doi":"10.1109/ICNIDC.2009.5360901","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360901","url":null,"abstract":"In this paper, we focus on an Online Social Network (OSN), namely “kaixin-net” (www.kaixin001.com) which is one of the biggest OSNs in China. Based on studying the most popular game ‘Buying-a-house’, we investigate user behaviors. First, we made a model for “Buying-a-house”, then using the dataset that we crawled and traced (we crawled about one hundred and fifty user's profiles and traced forty users for about twenty days), we draw the following findings: (1) People who just join the game have much interest in this OSN, actively interact with his friends. (2) The interest goes down according to the time lapse for most of users, but there are also a few players whose interests never go down and enjoy this game very much. These can be interpreted as the population of kaixin-net is growing at the beginning state, but it will decline after the peak comes. So the organizers should think about how to slow down the peak's coming.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su
{"title":"Implementation of Ad Hoc network terminal based on embedded ARM platform","authors":"X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su","doi":"10.1109/ICNIDC.2009.5360862","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360862","url":null,"abstract":"Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded ARM hardware platform and transplanting corresponding Ad Hoc protocol onto it. Our tests show that the platform we developed has realized the function of the Ad Hoc network successfully. Finally, we give some performance evaluation of this platform and propose possible solutions to improve it.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"634 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and design of data preprocessing of wireless sensor networks based on Multi-Agents","authors":"Ming Xu","doi":"10.1109/ICNIDC.2009.5360973","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360973","url":null,"abstract":"In view of the difficulty for nodes to renew the power and the structure of the wireless sensor networks, this paper presents a model of the data preprocessing of wireless sensor networks based on multi-agents by means of utilizing independent and intelligent of Multi-Agents. Then this paper introduces the structure of model and every Agent's function and trait. Moreover, the model also presents the algorithm to accomplish data preprocessing and avoids the error of the data collection. Thus this model could help to reduce the energy consumption attribute to communication between the nodes and enhance the effectiveness of data transmission.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed data transport service implement strategy in optical grid","authors":"Runze Wu, Xingqin Jiao, Dachuan Qu, Yuefeng Ji","doi":"10.1109/ICNIDC.2009.5360834","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360834","url":null,"abstract":"A distributed data transport service implementing strategy is proposed to support grid network service with dynamic optical resource provisioning. The distributed data transport provides grid user with dynamic lightpaths. The test bed circling the resource managing and scheduling mechanism is built on the base of Globus Tookit 4. Optical grid middleware is developed to achieve grid network service, combining GridFTP and GMPLS network control, supporting network resource discovering, management and reservation. Also, the big-bulk data transport application spreads on the test bed with parallel lightpaths with the distributed and parallel transporting for the different data slices.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}