2006 International Conference on Systems and Networks Communications (ICSNC'06)最新文献

筛选
英文 中文
Security Issues in Wireless Sensor Networks 无线传感器网络中的安全问题
T. Zia, Albert Y. Zomaya
{"title":"Security Issues in Wireless Sensor Networks","authors":"T. Zia, Albert Y. Zomaya","doi":"10.1109/ICSNC.2006.66","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.66","url":null,"abstract":"Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122120418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol Benaloh-Tuinstra协议的窃国学弱点
Piotr Borzecki, J. Kabarowski, Przemyslaw Kubiak, Mirosław Kutyłowski, Filip Zagórski
{"title":"Kleptographic Weaknesses in Benaloh-Tuinstra Protocol","authors":"Piotr Borzecki, J. Kabarowski, Przemyslaw Kubiak, Mirosław Kutyłowski, Filip Zagórski","doi":"10.1109/ICSNC.2006.50","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.50","url":null,"abstract":"During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Real-Time Study of 802.11b and 802.11g 802.11b和802.11g的实时研究
Victor A. Clincy, Ajay Sitaram, David Odaibo, Garima Sogarwal
{"title":"A Real-Time Study of 802.11b and 802.11g","authors":"Victor A. Clincy, Ajay Sitaram, David Odaibo, Garima Sogarwal","doi":"10.1109/ICSNC.2006.14","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.14","url":null,"abstract":"In recent past, there has been a tremendous increase in the study and implementation of wireless technologies. The idea of wireless networks started with the 802.11 standards that soon became popular with the wireless LAN, called Wi-Fi. The increase usage of Wi- Fi-enabled laptops, PDA¿s and other devices is a clear indicator of Wi-Fi¿s widespread acceptance. Wi-Fi is a conglomeration of standards, out of which the three main standards are 802.11b, 802.11a and 802.11g. Two of the standards, 802.11b and 802.11g, have interoperable characteristics; while the other, 802.11a, operates on a completely different frequency and hence lacks such interoperability. The objective of this paper is to study the performance of 802.11b and 802.11g standards in real-time while implementing an actual file transfer. The specific performance factors studied were protocol congestion, bandwidth and latency.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"8 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120841785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Verification of Strict Integrity Policy via Petri Nets 通过Petri网验证严格的完整性策略
Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao
{"title":"Verification of Strict Integrity Policy via Petri Nets","authors":"Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao","doi":"10.1109/ICSNC.2006.76","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.76","url":null,"abstract":"Strict Integrity Policy is one of important security policies. In this paper, based on Petri net and Biba Model, the Petri net-based definitions of Strict Integrity Policy are formally described in detail. The Petri net-based definitions and the coverability graph allow one to analyze and verify Strict Integrity Policy in Petri net model of a system. Subsequently, an example of the integrity policy is illustrated and the conclusions show that Petri net is not only a concise graphic analysis method, but also suited to formal verification. This verification approach can efficiently improve the integrity policies during the system security design and implementation.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network 一种基于ROD的有线/无线混合网络TCP模糊丢包判别算法
Su Fang, Fan Yinglei, Li Yong, X. Huimin
{"title":"A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network","authors":"Su Fang, Fan Yinglei, Li Yong, X. Huimin","doi":"10.1109/ICSNC.2006.15","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.15","url":null,"abstract":"A fuzzy pattern recognition loss differentiating algorithm in hybrid wired/wireless network is proposed, which distinguishes losses due to congestion from losses due to wireless error by ascribing the loss to the most likely pattern, congestion or wireless error, based on the packet ROD feature. The loss nature differentiating is a fuzzy problem, different reasons can influence the judgment at the same time, but all most the current researches take simple two values logic to this problem, so it is hard for them to get satisfying performance. In this paper, we take fuzzy pattern recognition logic on this fuzzy question based on the ROD feature of the probing packet in the loss pair. Simulation shows it performs better than the current TCP mechanism.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR 一种确定DDBS中片段最优位置的新方法:BGBR
A. Bayati, Pedram Ghodsnia, M. Rahgozar, R. Basseda
{"title":"A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR","authors":"A. Bayati, Pedram Ghodsnia, M. Rahgozar, R. Basseda","doi":"10.1109/ICSNC.2006.12","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.12","url":null,"abstract":"This paper addresses the problem of determining the optimal location to place a fragment (object) in a distributed non-replicated database. The algorithm defined takes into consideration a changing environment with changing access patterns. This paper contributes by allocating data fragments to their optimal location, in a distributed network, based on the access patterns for that fragment. The mechanism for achieving this optimality relies on knowing the costs involved in moving data fragments from one site to the other. Embedded into the algorithm is a mechanism to prioritize fragments so that if there is a limited space on a specific node where many fragments are chosen to be allocated the ones with higher priority are placed before the lower priority fragments.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wireless Broadband Internet Access in Korea 韩国的无线宽带互联网接入
Yoonju Lee, S. Chang, Young Il Kim, Song-in Choi, J. Ahn
{"title":"Wireless Broadband Internet Access in Korea","authors":"Yoonju Lee, S. Chang, Young Il Kim, Song-in Choi, J. Ahn","doi":"10.1109/ICSNC.2006.77","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.77","url":null,"abstract":"This paper discusses the new technology of the Wireless Broadband (WiBro) Internet Access System based on IEEE 802.16d and 802.16e. It has the advantages of a seamless service by mobility of mobile cellular, and high-speed data transmission and low cost of WLAN. The WiBro system is designed to provide broadband Internet access to the mobile users by a seamless service. WiBro services could be a solution that satisfies customers¿ need on new mobile data services overcoming existing restrictions. The standardization and technology development for WiBro","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Autonomically Improving the Security and Robustness of Structured P2P Overlays 自主提高结构化P2P覆盖的安全性和鲁棒性
Gerald Kunzmann, A. Binzenhöfer
{"title":"Autonomically Improving the Security and Robustness of Structured P2P Overlays","authors":"Gerald Kunzmann, A. Binzenhöfer","doi":"10.1109/ICSNC.2006.24","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.24","url":null,"abstract":"Recent research efforts have shown that peer-topeer (p2p) mechanisms incorporate a potential that goes well beyond simple file sharing. Compared to the classic client-server architecture, these systems do not suffer from a single point of failure. However, there is still the danger that an adversary is able to attack a specific subpart of the system. This is especially true for structured p2p networks like Chord. A well targeted attack could cause disruptions in its global ring structure and result in severe performance degradations, loss of resources or major malfunctions. In this paper we introduce a self-protecting approach to prevent such disruptions before they actually happen. However, since it is practically impossible to avoid all failures and attacks, we also present selfrepairing algorithms, which are able to automatically detect disruptions and initiate appropriate countermeasures to reestablish the structure of the overlay.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment 无线信道环境下蓝牙网络性能分析与评价
J. Roh
{"title":"Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment","authors":"J. Roh","doi":"10.1109/ICSNC.2006.58","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.58","url":null,"abstract":"Progress in wireless technology has fostered the widespread use of computing and communication devices for commercial usage. The success of consumer products like PCs, laptops, PDA, mobile phones, and their peripherals has been based on continuous cost and size reduction. The objective of this paper is to evaluate the impacts of impulsive noise, cochannel interference due to other piconet, Nakagami fading on the bit error rate (BER), and throughput performance in the Bluetooth scatternet. Simulation results illustrate the significant difference in performance between synchronous and asynchronous Bluetooth networks. The paper also provides the insights on how to design Bluetooth scatternet for minimal error rate and maximum throughput performance.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A New Communication Architecture Based on the Spatial Information Field Model 基于空间信息场模型的新型通信体系结构
Haibin Liu
{"title":"A New Communication Architecture Based on the Spatial Information Field Model","authors":"Haibin Liu","doi":"10.1109/ICSNC.2006.8","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.8","url":null,"abstract":"In this paper, we propose a hybrid communication architecture through the integration of network and field models. The architecture is based on the spatial information field model that is defined in a four dimensional time-space, and consists of numbers of independent IAs (intelligent agents). Each IA has 7 different communication and information processing patterns. Through different space allocation and physical combination of network and field communication modes of N IAs, we construct a four dimensional and time-related spatial information field (SIF) model, which is a dynamic system and does not have any central control unit. By using the SIF model, the communication mechanism in terms of information processing is discussed using the modern global war simulation concept as an example. The discussion concludes that the proposed architecture can provide a unified solution for the current different communication models and methods.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信