{"title":"Lifetime Maximization by Cross-Layer Interaction in Wireless Sensor Networks","authors":"In-Yeup Kong, W. Hwang","doi":"10.1109/ICACT.2006.206401","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206401","url":null,"abstract":"We consider the cross-layer design considering physical layer, MAC layer, and network layer to maximize the lifetime of energy-constrained wireless sensor network. Our solution is based on system model that considers reliability as well as physical layer (i.e., power control), data link layer (i.e., and link scheduling) and network layer (i.e., routing protocol) jointly. To obtain more energy-efficient solution for lifetime maximization of wireless sensor networks, we enhance existing cross-layer model using energy-efficient MAC protocol and energy-consumption model instead of TDMA","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Periodic medium reservation timer mechanism for VoIP in IEEE 802.11 wireless LAN","authors":"Daeyoung Kim, Koo Ki Jong, Do Young Kim","doi":"10.1109/ICACT.2006.206326","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206326","url":null,"abstract":"The IEEE 802.11 wireless LAN is providing convenient mobile service and is gaining popularity for data applications in campus networks. So the IEEE 802.11-compliant wireless LAN equipments become dominant. Also, the voice service through wireless LANs has become an important issue. Quality-of-service (QoS) for voice-over-IP (VoIP) is also an important issue in IP networks. In this paper, we propose new medium access mechanism for VoIP packets to reduce the delay by medium access in IEEE 802.11 or IEEE 802.11e wireless LANs","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The expansion of key infection model for dynamic sensor network","authors":"Young-Sik Hwang, Seung-wan Han, Taekyong Nam","doi":"10.1109/ICACT.2006.206018","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206018","url":null,"abstract":"The establishment of shared cryptography keys is one of the challenging problems in the sensor networks. Key infection (R. Anderson et al., 2004) is a promising model to solve this problem without complex mechanism on the commodity sensor networks. This model, however, does not consider the mobility of sensor, so it can not support dynamic sensor network fields. Therefore, key infection model has to be extended to handle the mobility of sensor, and then an extended key infection model can be used on the dynamic sensor network. In this paper, we propose a scheme to extend the key infection model for supporting dynamic sensor networks and explain how the proposed scheme is operated in detail. Also we prove that the proposed scheme is secure","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection Algorithm against security holes of IPv6 routing header","authors":"Jae-Deok Lim, Youngki Kim","doi":"10.1109/ICACT.2006.206388","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206388","url":null,"abstract":"Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minjung Kim, Yeonjune Choi, YoungBag Moon, Sun-joong Kim, O. Kwon
{"title":"Design and implementation of status based application manager for telematics","authors":"Minjung Kim, Yeonjune Choi, YoungBag Moon, Sun-joong Kim, O. Kwon","doi":"10.1109/ICACT.2006.206225","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206225","url":null,"abstract":"The applications for telematics are not any more limited to classical embedded control system but cover a broad range from driver assistance to infortainment and vehicle information management. To manage various kinds of telematics application, we need furthermore new application manager for the automotive domain that allow to support the different software types specifically, corresponding to their vehicle's status and later on integrate the system parts to one reliable and manageable system. This paper is intended to suggest an architecture for applications management in the field of in-vehicle software. This architecture is based on international standards, such as OSGi framework and AMI-C Specification","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hung Ngoc Le, Q. X. Nguyễn, S. Choi, Yeonseung Shin
{"title":"An approach for optimal system selection for ISHO in future convergence network","authors":"Hung Ngoc Le, Q. X. Nguyễn, S. Choi, Yeonseung Shin","doi":"10.1109/ICACT.2006.206126","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206126","url":null,"abstract":"The vision of ubiquitous service has required an increase in the development of future convergence network (FCN) that supports mobile users with seamless migration among heterogeneous networks while maintaining the QoS. The FCN allows mobile users to access to the services at anytime and from anywhere, use various devices, and move among different radio interfaces by executing inter-system handover (ISHO) function. The ISHO can redirect streams of application communication between heterogeneous overlay networks while maintaining the application with QoS. However, current research in ISHO has mainly focused on handovers activated by user's interruptions when user moves out of current network coverage. ISHO for the FCN should not only meet the above criterion, but also meet the other conditions such as predict interruption, improve QoS, support user preference for communication network. The ISHO procedures are divided into 3 steps; system discovery, system selection and decision, and execution. The paper is mainly concentrated on 1st step and 2nd step, the system discovery, selection and decision, in order to extend ISHO to support all above criteria and therefore allow mobile host to have dynamic network changing capabilities to maintain a continuous network connection while moving among heterogeneous networks. In order to select an optimal system among multitude points of attachment available to the network, there is a need for a more investigation into the resource management and the fuzzy logic applicable to the ISHO","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast handover scheme based on enhanced access point (EAP) for Mobile IPv6","authors":"Byungjoo Park, H. Latchman","doi":"10.1109/ICACT.2006.206075","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206075","url":null,"abstract":"Mobile IPv6 has been proposed to support host mobility in the Internet, yet during a handover Mobile IPv6 (MIPv6) suffers from packet disruption and packet loss. Furthermore, inherent delays associated with movement detection are unavoidable in standard MIPv6. In this paper, we propose to mitigate such effects with a more efficient fast neighbor discovery routine which requires each access point to execute movement detection using an enhanced beacon signal with stored router advertisement (RA) messages; we also implement a modified access point to handle fast configuration of the care-of address (CoA). Performance analysis indicates the handover latency in the proposed scheme could be reduced compared to standard MIPv6. The proposed scheme is also a strong candidate to support real-time application like VoIP","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaboration Services to Support Interactions in Disaster Relief Scenarios","authors":"S. Ochoa, R. Aldunate","doi":"10.1109/ICACT.2006.206192","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206192","url":null,"abstract":"Many groupware applications developed on top of platforms supporting collaborative work are limited in their portability and interoperability because they are platform locked. In heterogeneous scenarios, such as disaster relief efforts or police operations, the interoperability of the several systems becomes a critical issue to coordinate the efforts of every operative unit. This paper presents a middleware called DCSL collaboration services layer - that provides a set of standard groupware services for both client and server applications allowing interoperability among heterogeneous groupware systems. The services encapsulate and hide incompatibilities among groupware platforms and thus, they allow developers to build interoperable groupware applications with a minor effort","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong-ju Kim, S. Myong, H. Hong, Jong Hyun Lee, Jung Sik Kim
{"title":"The Role of Ethernet over SDH in QoS Switch/Router","authors":"Hong-ju Kim, S. Myong, H. Hong, Jong Hyun Lee, Jung Sik Kim","doi":"10.1109/ICACT.2006.206137","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206137","url":null,"abstract":"This paper describes the role of a standards-based Ethernet over SDH architecture that unites SDH, RPR and MPLS for the transport of Ethernet in QoS switch/router (QSR). One of QSR transport solution uses SDH as the physical layer and employs technologies such as GFP, VC and LCAS to enable transparent Ethernet over existing SDH infrastructure. Ethernet traffic can be carried over the RPR-enabled transport infrastructure using MPLS in QSR's EoS line card. In the aspect of the required SDH capacity the significant savings of capital expenditure are obtained from EoS and RPR-enabled overlay solution comparing to Ethernet point-to-point solution. EoS enables a service provider to offer Ethernet services efficiently by using existing SDH resources and to increase the value of existing SDH networks","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125329921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}