{"title":"Neural Wireless Sensor Networks","authors":"F. Oldewurtel, P. Mähönen","doi":"10.1109/ICSNC.2006.56","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.56","url":null,"abstract":"We present an overview of embedded network applications and discuss requirements arising from this analysis. Furthermore, we discuss selected in-network processing techniques and point out the analogy between neural and sensor networks. In the following neural networks are introduced in the sensor network context. We describe the motivation and the practical case for neural networks in the sensor networks context, and evaluate early results achieved with our test implementation. We argue that there is a high potential with these paradigms which promise a strong impact on the future research, especially if applied as a hybrid technology.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Event Detection in Sensor Networks","authors":"Fernando Martincic, L. Schwiebert","doi":"10.1109/ICSNC.2006.32","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.32","url":null,"abstract":"This paper introduces a distributed event detection scheme for wireless sensor networks (WSN). Event signatures are disseminated throughout the WSN and, using a localized push-based strategy, nodes match their sensor readings against stored event signatures. The technique proposed is well-suited to large networks by reducing and load-balancing the network traffic generated.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131822129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks","authors":"A. Rachedi, A. Benslimane","doi":"10.1109/ICSNC.2006.74","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.74","url":null,"abstract":"An Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through wireless links in the absence of the fixed infrastructure and any centralized control. Theses characteristics make it able to adapt and operate in difficult conditions, but also vulnerable to new security attacks not present in a traditional wired network. In this paper a new approach to secure MANETs has been proposed. Our solution is based on our efficient trust model and distributed algorithm to clustering network in order to distribute role of certification authority (CA) in each cluster. We use fully self-organized security and monitoring process to supervise behaviors of nodes with low trust level. Also, we propose clustering algorithm based on the trust and mobility metric to select CA and to establish public key infrastructure (PKI) in each cluster. Furthermore, we introduce new concept Dynamic Demilitarized Zone (DDMZ) to protect CAs and avoid the single point of failure in each cluster. The DDMZ is formed by set of the dispensable nodes which must be confident and located at one-hop from the CA. Our approach can be easily extended to other hierarchical routing protocols. The simulation results include an evaluation of the stability, availability and security.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks","authors":"S. Fowler, S. Zeadally","doi":"10.1109/ICSNC.2006.31","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.31","url":null,"abstract":"Traditional security research has been on privacy or authentication. Unfortunately, attacks on wireless media cannot be simply addressed using traditional security methods [1]. An example of a security threat which is difficult to address using traditional network security techniques is Denial of Service (DoS) attacks. Under DoS attacks it is difficult to provide legitimate users their fair shares of bandwidth. However, it is important to allocate a fair share of bandwidth for multimedia traffic requiring Quality of Service. In this paper we address the issue of DoS attacks between mobile nodes and MPLS domains by proposing a queue differentiation policy at the entry point of the MPLS domain. We also investigated DoS attacks of the entry point (Foreign Domain Agent) into Micro-MPLS-based networks (otherwise know a Hierarchical Mobile MPLS (HMPLS)) [2]. Our simulation results show that our proposed technique provides maximum resource utilization by increasing the throughput of multimedia traffic while the network is under DoS attacks.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware - An Effort towards Making Mobile Applications Platform Independent","authors":"Neeraj Gupta, Vishal Srivastav, M. Bhatia","doi":"10.1109/ICSNC.2006.54","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.54","url":null,"abstract":"We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using the middleware run on a wide range of devices. Currently we have considered Symbian OS and Windows CE OS. The middleware is implemented in C++ and it provides good performance in terms of memory use and execution speed. The middleware requires less than 50 KB of memory and is suitable for resource-constrained mobile phones. The first experiments verify that the middleware operates well and offers a good basis for future development.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach","authors":"Kun Tu, Kun Bi, Naijie Gu, W. Dong, Xiaohu Liu","doi":"10.1109/ICSNC.2006.52","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.52","url":null,"abstract":"In this paper, we address the problem of MAC address assignment in wireless sensor networks. A novel scheme for MAC address assignment is proposed to reduce the overhead. We model the problem from the game theoretical view, prove there exists a mixed strategy Nash equilibrium in the model, and propose a distributed address assign algorithm to achieve the equilibrium, which takes the advantage of the exploitation of spatial address reuse to save energy. Simulation results demonstrate that our algorithm is efficient even for very largescale networks, which makes it a potential candidate for practical applications.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote Screen Recording and Playback","authors":"S. Wu, Shih-Jen Chu, Tzao-Lin Lee","doi":"10.1109/ICSNC.2006.64","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.64","url":null,"abstract":"Microsoft Remote Desktop Protocol (RDP) is used to control the screen activities of a remote computer. The RDP supports various mechanisms to reduce the amount of data transmitted over a low-bandwidth network connection, such as data compression, caching of bitmaps, etc. We used all these features to develop a remote screen recording system, which can be applied to computer education and business presentation. Presently, a variety of screen recording tools are available. However, these video based screen recording systems have problems with poor output quality and large storage requirement. Comparatively speaking, the remote screen recording and playback system we developed produces excellent output quality and requires a smaller recorded file than the compressed video files.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xueqin Jiang, M. Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun
{"title":"Ternary Codes From Modified Hadamard Matrices","authors":"Xueqin Jiang, M. Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun","doi":"10.1109/ICSNC.2006.69","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.69","url":null,"abstract":"In this paper we construct two families C*m and C*m of ternary (2^m ,3^m ,2^m-1) and (2^m ,3^m+1,2^m-1) codes, for m =1,2,3,.., derived from the corresponding families of modified ternary Hadamard matrices. These codes are close to the Plotkin bound and have a very easy decoding procedure.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}