{"title":"Identity based secure AODV and TCP for mobile ad hoc networks","authors":"Uttam Ghosh, R. Datta","doi":"10.1145/2185216.2185308","DOIUrl":"https://doi.org/10.1145/2185216.2185308","url":null,"abstract":"Security is a prime requirement for communication between authorized hosts in mobile ad hoc networks(MANETs). Recently, several approaches have been proposed to secure the routing of MANET. However, most of the approaches do not consider the security aspect on data transmission of transmission control protocol (TCP). As a result, several types of security threats in TCP can be observed. In this paper, we propose an identity (ID) based scheme that secures AODV and transmit TCP data to the authorized hosts. The proposed scheme secures the AODV using sequential aggregate signatures (SAS) based on RSA and also securely generates the session key for the MANET nodes to secure the TCP. In the proposed scheme, each node have an ID which is evaluated from its public key and messages are sent along with signature/MAC for authentication purpose. Following the proposed scheme a node cannot change its ID throughout the lifetime of the MANET. Therefore, the scheme is secure against the attacks that are associated with AODV and TCP in MANET. Performance analysis shows that our proposed scheme is secure and efficient against various types of attacks with fairly good overhead.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contextual information integration platform for humanitarian relief","authors":"Shivsubramani Krishnamoorthy, A. Agrawala","doi":"10.1145/2185216.2185243","DOIUrl":"https://doi.org/10.1145/2185216.2185243","url":null,"abstract":"It is well recognized that context plays a significant role in all human endeavors. All decisions are based on information which has to be interpreted in context. By making the information systems context-aware we can have systems that significantly improve the human capabilities to handle situations context. In this paper, we highlight the significance of Context that wireless devices should be able to support, especially in the event of a calamity or a disaster to provide much more effective support to the relief efforts. In such situations, where wireless device users need to be provided with critical information for purposes such as evacuation, relief work etc., it is equally important to provide information that suits current situation of the user while taking into account the current environment around the user. We present Rover II, framework for contextual information integration for wireless devices. With our belief that information processing systems should only provide support to the human decision maker (and not attempt to replace him/her), the Rover provides means for supporting the flow of information filtered and augmented using relevant contextual information. Our framework uses a paradigm for handling context information that includes user specific context combined with activity context and common context. We outline the significance of context-awareness with the help of a mobile application/system developed at Maryland on how effective such systems can be in situations of disaster or calamity.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolas Mayor, J. Wagen, Abhishek Samanta, Ravi Sundaram
{"title":"PhoneGuard: a smartphone in the coalmine","authors":"Nicolas Mayor, J. Wagen, Abhishek Samanta, Ravi Sundaram","doi":"10.1145/2185216.2185299","DOIUrl":"https://doi.org/10.1145/2185216.2185299","url":null,"abstract":"In the short span of less than a decade the mobile phone has become a ubiquitous feature of life in India. Everyone from the chai-wallah to the CEO has a cell-phone and in recent years many of these are smart-phones capable of running smart-apps. Our focus is on conceiving a practical and useful app that can aid in disaster prevention and actually implementing and testing it. Towards this end we created PhoneGuard -- a smart-app that converts the phone into a remote monitoring device -- you leave the phone in a sensitive location like on the banks of a river or inside a coal-mine and it periodically takes pictures, does simple image analysis and checks for coherence over time, if warranted (e.g. in case of flooding of the river or buckling of beams in a coal-mine) it raises an alarm and follows an escalation procedure to push live images to a webpage. A complete working system was developed using standardized software and tested using realistic conditions. We believe that the image analysis and its integration into an escalation procedure is a novel aspect of our system.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134309170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LTE for rural applications and humanitarian relief","authors":"K. Sivarajan","doi":"10.1145/2185216.2185293","DOIUrl":"https://doi.org/10.1145/2185216.2185293","url":null,"abstract":"India faces a huge challenge in providing health services in rural areas. India, with only 8 skilled health workers per 10,000 people compared to the international norm of 25. needs to use wireless broadband technology along with cost-effective devices and cloud telemedicine apps, to extend healthcare to rural areas. The proper use of wireless broadband will ensure that advanced medical facilities, which are concentrated today in urban areas, is available to rural areas.\u0000 In addition to the rural health divide and lack of health care in remote area get more chronic especially during natural disaster. India has lost close to 35,000 lives in major quakes in last 20 years. Every year 30 million are affected by flood and another 50 million are affected by drought. Sadly, all these natural disaster seem to happen at regular intervals. The key effect of natural disasters as per WHO are deaths, severe injuries needing extensive treatment, damage to health facilities and water systems, spread of communicable disease etc. In this talk, we will explain how LTE and LTE-Advanced provide various new technological enhancements which help to address these ill effects caused by natural disaster.\u0000 LTE and LTE-Advanced technologies provide very high spectral efficiency and hence is well suited as a cost effective mechanism to deliver wireless connectivity to the end user. The ability of TDD mode operation of LTE technology to change the ratio of downlink to uplink data rate can come handy when disaster zones usually become content generator rather than content consumer. The support of MBSFN (Multicast Broadcast Single Frequency Network) can be used to provide proactive training on best practices to be followed before and after the disaster. This will help to reduce the level of mortality through direct effect of disaster during the disaster and indirect effect like communicable diseases which can happen after a disaster. M2M (machine to Machine) enhancements provided in LTE-Advanced can be used for centralized monitoring of logistic telemetry so that efficient delivery of food, water, tent, Blanket etc can occur after a disaster. SON (Self-Organizing Network) capability in LTE will allow the establishment of mobile base station at disaster zone without much technical expertise and can bring back connectivity in a short time in case of site damages caused by earthquakes, cyclone etc.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utility based video scheduling for quality maximization in 4G WiMAX wireless networks","authors":"Kumar Ritikesh, A. Jagannatham","doi":"10.1145/2185216.2185277","DOIUrl":"https://doi.org/10.1145/2185216.2185277","url":null,"abstract":"In this work we propose a novel utility based algorithm for dynamic frame scheduling of a scalable video stream for video transmission over a 4G OFDMA wireless network. We consider the GOP structure of a temporally scalable video sequence and derive a scheme to compute the average utility and packet sizes of the frames belonging to the base and enhancement layers. This scheme is based on the rate models derived employing the H.264 joint scalable video model (JSVM) developed by the JVT and MPEG groups, and is hence readily applicable in practical scenarios. Based on the above rate models and standard video quality models existing in literature, we propose a utility index based optimal scheme for time-frequency (TF) resource scheduling in 4G OFDMA wireless systems towards video quality maximization. Simulation results in the context of 4G WiMAX cellular networks clearly demonstrate the superior performance of the proposed scheme compared to competing scheduling schemes existing in literature.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131059819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chitradevi, K. Baskaran, V. Palanisamy, D. Aswini
{"title":"Designing an efficient PCA based data model for wireless sensor networks","authors":"N. Chitradevi, K. Baskaran, V. Palanisamy, D. Aswini","doi":"10.1145/2185216.2185262","DOIUrl":"https://doi.org/10.1145/2185216.2185262","url":null,"abstract":"Recent technology in wireless communication has enabled the development of low-cost sensor networks. Sensors at different locations can generate streaming data, which can be analyzed in real-time to identify events of interest. Wireless sensor networks (WSNs) usually have limited energy and transmission capacity, which cannot match the transmission of a large number of data collected by sensor nodes. So, it is necessary to perform in-network data aggregation in the WSN which is performed by aggregator node. Since, the nodes in WSN are vulnerable to malicious attackers and physical impairment; the data collected in WSNs may be unreliable. So, in this paper, we propose an efficient model based technique to detect the unreliable data. Data model is designed using the sound statistical multivariate technique called Principal Component Analysis (PCA). But as a drawback, it is not robust to outliers. Hence, if the input data is corrupted, an arbitrarily wrong representation is obtained. To overcome this problem, we propose two approaches namely Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) to design robust PCA which aids in design of a noise-free data model. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach is effective and efficient.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical and networked sensor systems: challenges and opportunities","authors":"S. Das","doi":"10.1145/2185216.2185226","DOIUrl":"https://doi.org/10.1145/2185216.2185226","url":null,"abstract":"Rapid advancements in embedded systems, sensors and wireless communication technologies have led to the development of cyber-physical systems, pervasive computing and smart environments with important applications such as smart grids, sustainability, health care and security. Wireless sensor networks play significant role in building such systems as they can effectively act as the human-physical interface with the digital world through sensing, communication, computing and control or actuation. However, the inherent characteristics of wireless sensor networks, typified by resource constraints, high degree of uncertainty, heterogeneity and distributed control pose significant challenges.\u0000 This tutorial will provide a guided tour of (i) the characteristics and applications of cyber-physical systems and sensor networks, (ii) associated technical challenges and opportunities, and (iii) novel algorithmic frameworks and solutions for data collection from sensor streams, sensor data fusion, multi-modal context recognition, and situation-aware decision making. The common goal is to minimize energy consumption (i.e., maximize life time) and increase information accuracy (i.e., context quality) in wireless sensor networks. The tutorial will be concluded with open issues and future directions of research.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cache based ant colony routing algorithm for mobile ad hoc networks","authors":"S. Sathish, K. Thangavel, V. Vaidehi","doi":"10.1145/2185216.2185336","DOIUrl":"https://doi.org/10.1145/2185216.2185336","url":null,"abstract":"Mobile adhoc networks are formed dynamically without any infrastructure and each node is responsible for routing information among them. Ant colony optimization (ACO) algorithms are used to find an optimized solution for various problems. The change in topology makes the route from source to destination as dynamic fixed and changes with respect to time. The nature of network requires the optimized algorithm to perform route discovery, maintain route and detect failure along the path between two nodes. This paper proposes a cache based ant colony routing for mobile ad hoc networks for building highly adaptive and on-demand source initiated routing algorithm.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective frequency offset correction in OFDM systems with extended Kalman filtering technique","authors":"K. V. Babu, G. Ramachandra Reddy, J. Prakash","doi":"10.1145/2185216.2185330","DOIUrl":"https://doi.org/10.1145/2185216.2185330","url":null,"abstract":"Disaster Management System (DMS) is a key solution for humanitarian relief from natural disasters and manmade disasters. This paper discusses the use of Orthogonal Frequency Division Multiplexing (OFDM) in DMS. OFDM is a multicarrier modulation (MCM) in which single data stream is transmitted over a number of lower rate sub carriers. The main reason to use OFDM is to increase the robustness against frequency selective fading and narrow band interference. However an important issue like inter carrier interference (ICI) caused due to Doppler frequency offset and variations in local oscillators distorts the transmitted OFDM signal. In this letter a novel ICI mitigation method which uses Extended Kalman Filter (EKF) is proposed to mitigate the ICI effects. Final simulated results show that the proposed method in this paper outperforms the conventional ICI mitigation techniques.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123396590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless network security","authors":"S. Kasera","doi":"10.1145/2185216.2185235","DOIUrl":"https://doi.org/10.1145/2185216.2185235","url":null,"abstract":"The need for ubiquitous network access and services is fueling tremendous growth of wireless technologies, networks, and applications. Mobile and wireless devices are being increasingly used for a variety of applications including multimedia, information search and retrieval, entertainment, social, business, and medical applications, and sensing and actuation, among others. However, the broadcast nature of wireless communications, wireless device mobility and resource limitations, have given rise to newer security challenges. An understanding of these challenges and potential solutions is necessary for designing secure wireless and mobile systems and applications and, at the very least, for increasing user awareness. In this tutorial, we will first describe security tools, including the cryptographic ones, and then elaborate how these tools can be used to secure wireless networks. Specifically, we will examine security vulnerabilities and solutions related to authentication, private communication, anonymity, and jamming. We will strengthen the concepts we cover with examples from WiFi networks, cellular networks, mobile ad hoc networks, and wireless sensor networks. We will also present some of the commonly deployed wireless security standards.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}