2006 International Conference on Systems and Networks Communications (ICSNC'06)最新文献

筛选
英文 中文
Neural Wireless Sensor Networks 神经无线传感器网络
F. Oldewurtel, P. Mähönen
{"title":"Neural Wireless Sensor Networks","authors":"F. Oldewurtel, P. Mähönen","doi":"10.1109/ICSNC.2006.56","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.56","url":null,"abstract":"We present an overview of embedded network applications and discuss requirements arising from this analysis. Furthermore, we discuss selected in-network processing techniques and point out the analogy between neural and sensor networks. In the following neural networks are introduced in the sensor network context. We describe the motivation and the practical case for neural networks in the sensor networks context, and evaluate early results achieved with our test implementation. We argue that there is a high potential with these paradigms which promise a strong impact on the future research, especially if applied as a hybrid technology.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Distributed Event Detection in Sensor Networks 传感器网络中的分布式事件检测
Fernando Martincic, L. Schwiebert
{"title":"Distributed Event Detection in Sensor Networks","authors":"Fernando Martincic, L. Schwiebert","doi":"10.1109/ICSNC.2006.32","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.32","url":null,"abstract":"This paper introduces a distributed event detection scheme for wireless sensor networks (WSN). Event signatures are disseminated throughout the WSN and, using a localized push-based strategy, nodes match their sensor readings against stored event signatures. The technique proposed is well-suited to large networks by reducing and load-balancing the network traffic generated.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131822129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks 基于信任和移动性的安全移动Ad Hoc网络聚类算法
A. Rachedi, A. Benslimane
{"title":"Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks","authors":"A. Rachedi, A. Benslimane","doi":"10.1109/ICSNC.2006.74","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.74","url":null,"abstract":"An Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through wireless links in the absence of the fixed infrastructure and any centralized control. Theses characteristics make it able to adapt and operate in difficult conditions, but also vulnerable to new security attacks not present in a traditional wired network. In this paper a new approach to secure MANETs has been proposed. Our solution is based on our efficient trust model and distributed algorithm to clustering network in order to distribute role of certification authority (CA) in each cluster. We use fully self-organized security and monitoring process to supervise behaviors of nodes with low trust level. Also, we propose clustering algorithm based on the trust and mobility metric to select CA and to establish public key infrastructure (PKI) in each cluster. Furthermore, we introduce new concept Dynamic Demilitarized Zone (DDMZ) to protect CAs and avoid the single point of failure in each cluster. The DDMZ is formed by set of the dispensable nodes which must be confident and located at one-hop from the CA. Our approach can be easily extended to other hierarchical routing protocols. The simulation results include an evaluation of the stability, availability and security.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks 基于队列流量区分的微mpls无线网络DDoS攻击防范
S. Fowler, S. Zeadally
{"title":"Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks","authors":"S. Fowler, S. Zeadally","doi":"10.1109/ICSNC.2006.31","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.31","url":null,"abstract":"Traditional security research has been on privacy or authentication. Unfortunately, attacks on wireless media cannot be simply addressed using traditional security methods [1]. An example of a security threat which is difficult to address using traditional network security techniques is Denial of Service (DoS) attacks. Under DoS attacks it is difficult to provide legitimate users their fair shares of bandwidth. However, it is important to allocate a fair share of bandwidth for multimedia traffic requiring Quality of Service. In this paper we address the issue of DoS attacks between mobile nodes and MPLS domains by proposing a queue differentiation policy at the entry point of the MPLS domain. We also investigated DoS attacks of the entry point (Foreign Domain Agent) into Micro-MPLS-based networks (otherwise know a Hierarchical Mobile MPLS (HMPLS)) [2]. Our simulation results show that our proposed technique provides maximum resource utilization by increasing the throughput of multimedia traffic while the network is under DoS attacks.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Middleware - An Effort towards Making Mobile Applications Platform Independent 中间件——使移动应用程序平台独立的一种努力
Neeraj Gupta, Vishal Srivastav, M. Bhatia
{"title":"Middleware - An Effort towards Making Mobile Applications Platform Independent","authors":"Neeraj Gupta, Vishal Srivastav, M. Bhatia","doi":"10.1109/ICSNC.2006.54","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.54","url":null,"abstract":"We propose a middleware architecture for GSM mobile phones that makes applications for mobile phones platform independent to a large extent as well as the applications made using the middleware run on a wide range of devices. Currently we have considered Symbian OS and Windows CE OS. The middleware is implemented in C++ and it provides good performance in terms of memory use and execution speed. The middleware requires less than 50 KB of memory and is suitable for resource-constrained mobile phones. The first experiments verify that the middleware operates well and offers a good basis for future development.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach 无线传感器网络中的Mac地址分配:一种混合策略博弈方法
Kun Tu, Kun Bi, Naijie Gu, W. Dong, Xiaohu Liu
{"title":"Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach","authors":"Kun Tu, Kun Bi, Naijie Gu, W. Dong, Xiaohu Liu","doi":"10.1109/ICSNC.2006.52","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.52","url":null,"abstract":"In this paper, we address the problem of MAC address assignment in wireless sensor networks. A novel scheme for MAC address assignment is proposed to reduce the overhead. We model the problem from the game theoretical view, prove there exists a mixed strategy Nash equilibrium in the model, and propose a distributed address assign algorithm to achieve the equilibrium, which takes the advantage of the exploitation of spatial address reuse to save energy. Simulation results demonstrate that our algorithm is efficient even for very largescale networks, which makes it a potential candidate for practical applications.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remote Screen Recording and Playback 远程屏幕录制和回放
S. Wu, Shih-Jen Chu, Tzao-Lin Lee
{"title":"Remote Screen Recording and Playback","authors":"S. Wu, Shih-Jen Chu, Tzao-Lin Lee","doi":"10.1109/ICSNC.2006.64","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.64","url":null,"abstract":"Microsoft Remote Desktop Protocol (RDP) is used to control the screen activities of a remote computer. The RDP supports various mechanisms to reduce the amount of data transmitted over a low-bandwidth network connection, such as data compression, caching of bitmaps, etc. We used all these features to develop a remote screen recording system, which can be applied to computer education and business presentation. Presently, a variety of screen recording tools are available. However, these video based screen recording systems have problems with poor output quality and large storage requirement. Comparatively speaking, the remote screen recording and playback system we developed produces excellent output quality and requires a smaller recorded file than the compressed video files.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ternary Codes From Modified Hadamard Matrices 修正Hadamard矩阵的三进制码
Xueqin Jiang, M. Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun
{"title":"Ternary Codes From Modified Hadamard Matrices","authors":"Xueqin Jiang, M. Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun","doi":"10.1109/ICSNC.2006.69","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.69","url":null,"abstract":"In this paper we construct two families C*m and C*m of ternary (2^m ,3^m ,2^m-1) and (2^m ,3^m+1,2^m-1) codes, for m =1,2,3,.., derived from the corresponding families of modified ternary Hadamard matrices. These codes are close to the Plotkin bound and have a very easy decoding procedure.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信