{"title":"I seek for knowledge: Exploiting social properties in Mobile Ad Hoc Networks","authors":"S. Belle, Muhammad Arshad Islam, M. Waldvogel","doi":"10.1109/WD.2008.4812924","DOIUrl":"https://doi.org/10.1109/WD.2008.4812924","url":null,"abstract":"New social networks are born each day, at a formal conference, at informal social gathering, at family reunions etc. Internet has already been playing an important role in modern way of socialising. But it is still not the optimal way of interaction as one has to be very active updating profiles. With the easy access to mobile devices, modern technologies have now started to adopt to new ways of socialising. mobile devices accompany their users almost all the time, they can record and observe their users behavior as well as gather information about their social circle. Therefore, they can help users to get information from contacts, that they probably not even know. In this paper we put our efforts towards the initial design of an architecture that will sniff for information around the user's surrounding, leveraging useful answers on their demand.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile PassPattern System (MPPS) advanced user authentication system for mobile devices","authors":"T. R. Kumar, S. Raghavan","doi":"10.1109/WD.2008.4812893","DOIUrl":"https://doi.org/10.1109/WD.2008.4812893","url":null,"abstract":"Mobile handheld devices such as PDAs and cell-phones are here to stay. Users and service providers are slowly and steadily switching to PDAs and cell-phones for electronic commerce transactions. The key factor is security of the information such as password that is used for authentication. Besides, all identification related information follow the first authentication step. We propose a simple, yet elegant method called Mobile PassPattern System (MPPS) to solve the authentication problem in a ubiquitous manner. We have shown that MPPS withstands all known attacks relevant to this mode of authentication.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125196667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Receiver blocking problem in mobile ad hoc networks: Challenges & solutions","authors":"K. Ghaboosi, M. Latva-aho, Yang Xiao","doi":"10.1109/WD.2008.4812908","DOIUrl":"https://doi.org/10.1109/WD.2008.4812908","url":null,"abstract":"The IEEE 802.11 has been shown to be quite inefficient in multihop networks. Besides the problems of hidden terminal and exposed terminal, there is also unreachability problem, which may result in link/routing failures and unfairness among multiple traffic flows. In this paper, a novel medium access control (MAC) protocol, called eMAC, is proposed. Under the proposed scheme, stations maintain double hop neighborhood (DHN) graphs while exchanging designated eMAC tables to share their knowledge about their neighbourhood topology. Using a DHN graph and an adaptive unreachability reporting mechanism, stations are reliably informed about their neighbours' unreachability status; therefore, they avoid establishing link layer connections with their unreachable neighbours and consequently, network resources are not consumed for unsuccessful connection establishment efforts. Furthermore, we propose an adaptive table broadcasting technique to facilitate topology information dissemination in mobile ad hoc networks. Performance of the proposed schemes is evaluated and compared with earlier schemes through simulations.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114575096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New wireless communication architectures for interactive fruition of historical and artistic contents","authors":"P. Pace, G. Aloi, A. Palmacci","doi":"10.1109/WD.2008.4812911","DOIUrl":"https://doi.org/10.1109/WD.2008.4812911","url":null,"abstract":"In this paper we describe a low cost testbed that integrates various technologies to offer a mixed set of multimedia and augmented reality (AR) contents to mobile users that are visiting a cultural site. Different technologies, such as Wi-Fi, Bluetooth and GPS, are integrated in a flexible architecture to provide indoor/outdoor location-aware services on commercial handheld devices. A real case of study is presented and detailed indoor results demonstrate that the proposed system can be easily adopted in museums or in other environments where an immersive interactive experience is very desirable.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Urien, Simon Elrharbi, Dorice Nyamy, H. Chabanne, T. Icart, C. Pepin, M. Bouet, Daniel de Oliveira Cunha, V. Guyot, Patrice Krzanik, Jean-Ferdinand Susini
{"title":"HIP-tags, a new paradigm for the Internet Of Things","authors":"P. Urien, Simon Elrharbi, Dorice Nyamy, H. Chabanne, T. Icart, C. Pepin, M. Bouet, Daniel de Oliveira Cunha, V. Guyot, Patrice Krzanik, Jean-Ferdinand Susini","doi":"10.1109/WD.2008.4812927","DOIUrl":"https://doi.org/10.1109/WD.2008.4812927","url":null,"abstract":"This paper deals with a new communication paradigm named HIP-tags. It introduces a new type of RFID, which communicates with the Internet thanks to the host identifier protocol, recently defined by the IETF. A modified version of this protocol has been studied, and an experimental platform will be deployed by 2009.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput, delay, and packet capture effects in Rayleigh fading of a cognitive radio packet network","authors":"S. Choe","doi":"10.1109/WD.2008.4812901","DOIUrl":"https://doi.org/10.1109/WD.2008.4812901","url":null,"abstract":"In this paper we present a slotted ALOHA based multi-channel cognitive radio network opportunistically using the unused spectrum of incumbent devices and analyze its throughput and delay. Furthermore, we analyze packet capture effects of the proposed system model over Rayleigh fading.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. M. Esposito, M. Campista, I. Moraes, L. Costa, O. Duarte, M. Rubinstein
{"title":"Implementing the Expected Transmission Time Metric for OLSR Wireless Mesh Networks","authors":"P. M. Esposito, M. Campista, I. Moraes, L. Costa, O. Duarte, M. Rubinstein","doi":"10.1109/WD.2008.4812900","DOIUrl":"https://doi.org/10.1109/WD.2008.4812900","url":null,"abstract":"This paper presents the design of a plug-in for the optimized link state routing (OLSR) protocol with the expected transmission time (ETT) metric and experiments in an indoor testbed. The ETT metric is implemented as a plug-in, keeping portability and facilitating its deployment on operational networks. Our design identifies important implementation issues. Additionally, we run experiments in an indoor testbed to verify the performance of our ETT plug-in. Our results show that the ETT metric has the lowest packet loss rate and the lowest round trip time among the analyzed metrics, because it reproduces link quality conditions and also takes into account physical transmission rates.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131665898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized MPR-based flooding in wireless ad hoc network using network coding","authors":"Nour Kadi, K. A. Agha","doi":"10.1109/WD.2008.4812903","DOIUrl":"https://doi.org/10.1109/WD.2008.4812903","url":null,"abstract":"Multipoint relays ldquoMPRrdquo have been introduced in the proactive protocol OLSR in order to optimize the flooding overhead of control traffic. In this paper we propose an algorithm to optimize the MPR-based flooding by using network coding where MPR nodes do not simply forward packets they overhear but may send out information that is coded over the contents of several packets they received. Our interest is to reduce the number of transmissions. We show by simulation that flooding can be efficiently performed by exploiting network coding with multipoint relays, resulting in significant reductions in the number of transmissions in the network. We can get benefits from this approach also in other practical considerations such as restricted complexity and memory capabilities.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy saving in future home environments","authors":"H. Hlavacs, R. Weidlich, Thomas Treutner","doi":"10.1109/WD.2008.4812847","DOIUrl":"https://doi.org/10.1109/WD.2008.4812847","url":null,"abstract":"Already, hundreds of millions of PCs are found in homes, offering high computing capacity without being adequately utilized. This paper reveals the potential for energy saving in future home environments, which can be achieved by sharing resources, and concentrating 24/7 computation on a small number of PCs. We present three evaluation methods for assessing the expected performance. A newly created prototype is able to interconnect an arbitrary number of homes by using the free P2P library FreePastry. The prototype is able to carry out task virtualization by sending virtual machines (VMs) from one home to another, most VMs being of size around 4 MB. We present measurement results from the prototype. We then describe a general model for download sharing, and compare performance results from an analytical model to results obtained from a discrete event simulator. The simulation results demonstrate that it is possible to reach almost optimal energy efficiency for this scenario.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121617827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency-Time Scheduling for streaming services in OFDMA systems","authors":"M. Assaad","doi":"10.1109/WD.2008.4812849","DOIUrl":"https://doi.org/10.1109/WD.2008.4812849","url":null,"abstract":"This paper proposes a novel Frequency Time scheduler, called Frequency Time Scheduler with Delay Constraints (FTSDC), in order to handle streaming traffic in OFDMA (Orthogonal Frequency Division Multiple Access) system. Streaming technique, widely developed and used in the internet to convey multimedia application (e.g., audio, video clip, etc.), is supposed to occupy a large share of bandwidth in future wireless systems (e.g. WiMAX, LTE ldquoLong Term Evolutionrdquo, etc.). The stringent QoS constraints of these services may be reached at the expense of the system capacity and therefore a trade off between Fairness and capacity should be achieved. The novel opportunistic scheduler proposed in this paper balances this trade off and allows thus OFDMA systems to handle streaming services without losing much cell capacity. Results afforded by this scheduler are promising and show that it outperforms the existing scheduling algorithms.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}