{"title":"Enabling Inter-PMIPv6-Domain Handover with Traffic Distributors","authors":"Feng Zhong, C. Yeo, Bu-Sung Lee","doi":"10.1109/CCNC.2010.5421812","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421812","url":null,"abstract":"As a local mobility management protocol, Proxy Mobile IPv6 (PMIPv6) is designed to enable mobile nodes to move in a domain without any involvement in the mobility signalling operation. However, a single domain cannot satisfy mobile nodes' movement requirement. Hence, we propose a solution to enable mobile nodes to move across multiple PMIPv6 domains. We introduce a new network entity called traffic distributor (TD) to manage the inter-domain handover. Through redirecting the traffic to the domain which currently visited by the mobile node, TD can ensure mobile node continue its session even when it moves across domains. We conduct a series of experiments to compare our proposal with Neumann proposal [1] which is another proposal to handle inter-PMIPv6-domain issues. Experimental results show that our proposal is a viable alternative for inter-domain handover, it can outperform Neumann proposal in terms of binding cache entry numbers, transmission delay and handover delay.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Estimation-Based Backoff Algorithm in the IEEE 802.11 Based Wireless Network","authors":"S. Kang, Jaeryong Cha, Jae-Hyun Kim","doi":"10.1109/CCNC.2010.5421643","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421643","url":null,"abstract":"This paper proposes a new backoff algorithm to enhance both the delay and the throughput of the Distributed Coordination Function (DCF) in the IEEE 802.11 based wireless networks. The proposed algorithm, which is named as the Estimation-based Backoff Algorithm (EBA), observes the number of the idle slots during the backoff period in order to estimate the number of active nodes in the network. Especially, when the number of nodes or the amount of traffic dramatically varies, the proposed algorithm determines a more appropriate contention window based on the estimation algorithm. This paper evaluates the performance of the proposed EBA by using simulation, and it compares the EBA's performance with other backoff algorithms such as the binary exponential back-off (BEB), the exponential increase exponential decrease (EIED), the exponential increase linear decrease (EILD), the pause count backoff (PCB) and the history based adaptive backoff (HBAB). The simulation results show that the EBA outperforms the other backoff algorithms because it has better adaptability to the network load variation. By comparing the performance of the EBA to that of the BEB, which is defined in the IEEE 802.11, the EBA increases the network throughput by around 25%, and it decreases the mean packet delay by about 50% when the number of nodes is 70.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131183880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Balancing between Efficiency and Fairness for Resource Management in Cognitive Radio Networks: A Dynamic Game-Theoretic Approach","authors":"Chungang Yang, Jiandond Li, Dan Chen","doi":"10.1109/CCNC.2010.5421628","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421628","url":null,"abstract":"Efficiency and fairness are the two critical and conflicting criterion indicators to measure radio resource management performance including the power and transmit control in the cognitive context. The best tradeoff is achieved using the dynamic game-theoretical approach in this paper, from the individual rationality and the social fairness perspective. Therefore, a two-step resource management scheme is investigated in the cognitive radio networks context, where the initial allocation focus on the personal efficiency and the second adjustment focus on the social fairness and the overall performance. Both the proposed algorithms during the two-steps scheme are distributed, with the help of the iterative water-filling algorithm and the sub-gradient method. Simulation numerical results tell the performance of the proposed algorithm.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Narasimhan, Joseph F. Wodka, P. Wong, V. Vasudevan
{"title":"TV Answers - Using the Wisdom of Crowds to Facilitate Searches with Rich Media Context","authors":"N. Narasimhan, Joseph F. Wodka, P. Wong, V. Vasudevan","doi":"10.1109/CCNC.2010.5421605","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421605","url":null,"abstract":"Television has always been a popular entertainment medium with considerable impact on consumer purchase behaviors. However. unlike mobiles and pes, it has yet to support an explicit search capability that extends beyond simple content navigation. A core reason for this is lack of usable input inteifaces for TV coupled with the dtfJiculty of creating and executing queries based on rich media context, In this paper, we present TV Answers - a system that combines a novel context capture capability (Freeze-Frame) with an intelligent web services mediator (Edge Proxy) to \"crowd-source\" user-generated queries. We describe the design and implementation of an early prototype of TV Answers and highlight the challenges and opportunities presented by such systems. Our goal is to demonstrate the viability of using \"social search\" as a complement to existing algorithm-driven search solutions for rich media consumption.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMOS Image Sensor Device for Objective Evaluation of Video Quality in Mass Distribution Networks","authors":"M. L. Graciano, A. Romariz, J. C. D. Costa","doi":"10.1109/CCNC.2010.5421579","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421579","url":null,"abstract":"This work aims to present a device for the objective evaluation of video quality from the user perspective, in mass content distribution networks. This simple and cost-effective device with an integrated image sensor and an embedded processor intends to be network pervasive while minimizing the network overhead, allowing quality measurements over the network with greater control of the content distribution throughout the video chain, from content producers, distributors and to consumers.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Behavioral Analysis Engine for Network Traffic","authors":"M. Faezipour, M. Nourani, Sateesh Addepalli","doi":"10.1109/CCNC.2010.5421828","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421828","url":null,"abstract":"Network intrusion detection systems continuously monitor the network traffic in order to identify any traces of suspicious activities such as worm, viruses or spam. One attractive technique for identifying potential Internet threats is detecting previously unknown, but common sub-strings that appear very frequently in data packets. In this paper, we propose a novel architectural platform that thoroughly analyzes the network traffic behavior in terms of repetitions to identify potential Internet threats. The main idea is to use a two-phase hashing system and small memory units functioning in parallel to achieve a high-throughput and memory efficient behavioral analysis engine. The system performs behavioral analysis on selected information/user(s) and builds a bell-shaped curve for normal traffic using parallel counters. Our traffic behavioral analysis system has been fully prototyped on Altera Stratix FPGA. Experimental results verify that our system can support line speed of gigabit-rates with very negligible false positive and negative rates.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kameyama, Takuji Suzuki, Kazushige Ouchi, Akihisa Moriya
{"title":"The Development of a System for Sleep Care and Its Applications","authors":"K. Kameyama, Takuji Suzuki, Kazushige Ouchi, Akihisa Moriya","doi":"10.1109/CCNC.2010.5421569","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421569","url":null,"abstract":"This paper describes a new sleep monitoring system for home use. The basic system consists of a wearable physiological sensor and the PC software for analyzing sleep quality from user's wrist motion and heart rate variability. Different from a conventional sleep monitoring device used in a hospital, the sensor is so small and easy-to-use that a normal person can use It at home. This means that the system is useful not only for a sleep specialist who wants to check his/her patient's daily sleep pattern, but also is useful for self-care. The concepts of the tele-care system and the real-time control of electric appliances for creating better sleep environment are also mentioned.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walter Rudametkin, Kiev Gama, Lionel Touseau, D. Donsez
{"title":"Towards a Dynamic and Extensible Middleware for Enhancing Exhibits","authors":"Walter Rudametkin, Kiev Gama, Lionel Touseau, D. Donsez","doi":"10.1109/CCNC.2010.5421602","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421602","url":null,"abstract":"Exhibit sites, such as museums and commercial conventions, do not usually allow or motivate visitor interaction with the exhibited items. In this work we present an architecture for providing an augmented experience for exhibits. In our concept, visitors can use wireless handheld devices to scan the identifiers (e.g. RFID tags, 2D barcodes) of exhibit items and receive information about them or trigger events in the surrounding environment. We present a generic middleware which is dynamic, extensible and configurable, and is capable of generating different responses to visitor interactions. Responses can consider the visitor's profile, the exhibit's or visitor's history, administrative preferences, and other information. They include sending events to the visitor's device or to devices surrounding the exhibit. The architecture hides development complexity and takes advantage of various technologies, integrating them into our middleware and our handset application. We also provide administration capabilities, such as reporting and exhibit configuration. Our concept has been implemented and validated in a museum scenario and uses multiple technolugies for communication, unique exhibit identification, and software dynamicity and extensibility.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavior Profiling and Analysis in Wireless Home Networks","authors":"Kuai Xu, Feng Wang, Bin Wang","doi":"10.1109/CCNC.2010.5421571","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421571","url":null,"abstract":"In recent years, the low cost of wireless technologies and residential broadband networks have driven the wide deployment of wireless home networks (WHNs). The ubiquitous availability of WHNs enables users the access to the Internet from everywhere within their homes. However, it also opens the doors for the drive-by hackers that exploit open access home networks for Internet connections [1]. Previous work such as [2] and our own measurement studies have shown the existence of a large amount of open or un-encrypted access points in wireless residential networks. For example, our recent measurement experiment finds an average of 35% are open home wireless networks in six residential buildings. At the same time, Internet attackers actively explore vulnerable home computers and turn them into part of botnets for sending spams or launching distributed denial of service (DoS) attacks [3]. The existing wireless access pointers from commercial vendors such as Linksys and Netgear are mostly built with NAT solutions and stateful packet inspection firewalls [4]. These techniques are very useful to filter attacks with known patterns, however they lack the ability to detect novel attacks or existing attacks with new variations. Therefore, it is very important to develop behavior-oriented techniques that do not rely on signatures for detecting such attacks. In this short paper, we present a preliminary design of a behavior profiling system in WHNs for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks, ii) detect anomalous behavior from inside networks as well as from the Internet. Based on network traffic patterns for each computer, the system builds baseline behavior profiles, and subsequently detects events of interest through behavior deviations. The contributions of this work are two-fold. First, we propose to build the behavior profiles for each computer in WHNs towards a deep understanding of the traffic patterns in wireless residential networks. Secondly, we present a systematic architecture that aims to detect anomalous behavior through real-time traffic profiling. The reminder of this short paper is organized as follows. Section II presents our behavior profiling methodology that Fig. 1. Behavior profiling system for wireless home networks.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1763 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Social Services","authors":"N. Klym, M. Montpetit, E. Blain","doi":"10.1109/CCNC.2010.5421692","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421692","url":null,"abstract":"Making a service social means providing a way for users to engage with a product or service as a group. We are specifically interested in groups based on connections that are established using the emerging online social networking tools like Facebook, MySpace, etc. This paper explores the value chain dynamics resulting from the integration of social networks with a given service. The example we will be using in this paper involves social TV applications, with a focus on social discovery. We hypothesize that these mashup social services introduce new control points in a given service's value chain, which complement or compete with existing control points. The paper focuses on the North American experience.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}