{"title":"A Crop Field Remote Monitoring System Based on Web-Server-Embedded Technology and CDMA Service","authors":"D. He, Youlu Bai, Yingzhe Wang, Hua Wu","doi":"10.1109/SAINT-W.2007.6","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.6","url":null,"abstract":"Remote monitoring systems based on Web-server-embedded technology and mobile telecommunication will become a core node technology in sensing network construction because of a great deal of mobile users and spreads of digital services in next generation telecommunication in the world. Soil, environmental, and crop information monitoring are important in production management and decision-making in precision agriculture. Therefore, reliability, security and inexpensive characteristics required are essential in the crop field information monitoring. Three improved field monitoring servers (FMS) using code division multiple access (CDMA) services combined with IPsec-based virtual private network (VPN) function have installed to two rice practical fields in Shanghai and one maize experimental field in Beijing for constructing a remote wireless sensing network. This crop field remote monitoring system as a ubiquitous node infrastructure in wireless sensing networks is useful and powerful to collect soil, environment, and crop information in remote for precision agriculture via two-years testing","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Asia-Wide Realtime Distributed Hands-On Workshop","authors":"Shoko Mikawa, Patcharee Basu, K. Okawa, J. Murai","doi":"10.1109/SAINT-W.2007.22","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.22","url":null,"abstract":"E-learning has made possible to conduct trainings online. However, region-wide trainings that require hands-on practice still need lecturers and participants at the same location. This requires huge resources on travel budget, time, equipments and staff. This paper proposes a region-wide distributed model of realtime hands-on workshop using distance learning and remote virtualization environment. The proposed model was implemented for SOI Asia operator training during 22-26 August 2006 inviting 42 participants from 19 institutions in 10 Asian countries. The workshop proved to have significant reduces in travel budget, lab preparation time and equipments compared to ordinary workshop model held in the previous year. Feedbacks show 95% of the participants evaluated this workshop is effective for their future operations. Accordingly, this workshop model is practical and resource-optimized model for region-wide human resource development. This paper can be a useful information source for future development and improvement of region-wide remote workshops","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teruaki Yokoyama, S. Kashihara, T. Okuda, Y. Kadobayashi, S. Yamaguchi
{"title":"A Generic API for Retrieving Human-Oriented Information from Social Network Services","authors":"Teruaki Yokoyama, S. Kashihara, T. Okuda, Y. Kadobayashi, S. Yamaguchi","doi":"10.1109/SAINT-W.2007.7","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.7","url":null,"abstract":"A unique type of Web service, called a social network service (SNS), first appeared in 2003. Some researches suggested a method to extract meaningful information from SNSs. Such meaningful information helps computers to understand human interests, concerns, and perceptions. We consider that socially aware computing has the potential to lead a new type of metric such human oriented information to access control, searches, and suggestions for contents. Accordingly, in this paper we propose the access application programmable interface (API) to find human-oriented information from outside a given SNS. We use the result of experiments on the API to demonstrate a network comprising relationships among communities. The results reveal that our proposed method can support developers in creating socially aware applications with SNSs","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Remote Hands-on Exercise Environment for an Asia-Wide Real-Time Workshop","authors":"Achmad Basuki, A. Thamrin, K. Okawa, J. Murai","doi":"10.1109/SAINT-W.2007.15","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.15","url":null,"abstract":"This paper discusses the problems of conducting a real-time workshop, where the instructors and the participants are located in different places, and the participants should perform hands-on lab exercises using computers that are located in another place. To address this problem, we implemented a remote hands-on exercise environment using virtual machines and a low-bandwidth remote console access. In this environment, the instructors can monitor each participant's exercise progress thus they can give specific feedbacks to the participants. We evaluated this environment using a real-time online workshop. We found that it was easy to setup, and participants had a good user-experience using this environment","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited Talk: Sketch Based Anomaly Detection, Identification and Performance Evaluation","authors":"P. Abry, P. Borgnat, G. Dewaele","doi":"10.1109/SAINT-W.2007.55","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.55","url":null,"abstract":"An anomaly detection procedure is defined and its statistical performance are carefully quantified. It is based on a non Gaussian modeling of the marginal distributions of random projections (sketches) of traffic aggregated jointly at different levels (multiresolution). To evaluate false negative vs. false positive in a controlled, reproducible and documented framework, we apply the detection procedure to traffic time-series from our self-made anomaly database. It is obtained by performing DDoS-type attacks, using real-world attack tools, over a real operational network. Also, we illustrate that combining sketches enables us to identify the target IP destination address and faulty packets hence opening the track to attack mitigation","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123399037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnostic Method of Quality Degradation Segment from Sampled Packets","authors":"Y. Yamasaki, H. Shimonishi, T. Murase","doi":"10.1109/SAINT-W.2007.42","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.42","url":null,"abstract":"Recent diversification in applications has increased the number of services that are sensitive to network quality. For such services, degradation of network quality such as packet loss or delay is directly linked to the quality perceived by users. It is therefore important for network administrators to know these quality indicators for each session. However, the measurement of quality per session has become difficult due to the rapid increase of line speeds. Packet sampling techniques have been receiving much attention as a way to solve this problem, but there has been only a little discussion of packet loss in that research though it is very important. In order to determine whether quality degradations occur at particular sessions, we have proposed methods for estimating the end-to-end packet loss per session by packet sampling. In this paper, we then propose a method to determine whether the quality degradation occurs between the sending terminal and the measurement point (send segment) or between the measurement point and the receiving terminal (receive segment). The proposed method will estimate packet loss of receive segment to observe duplicate ACKs and the DATA packet with corresponding sequence number to ACK number of duplicate ACKs. Then, the packet loss of send segment can be estimated by subtraction packet loss of receive segment from end-to-end packet loss. This allows quality degradation segment to be estimated from only a 10% sample of the packet flow","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123738051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kitatsuji, S. Katsuno, K. Yamazaki, M. Tsuru, Y. Oie
{"title":"Distributed Flow Monitoring Tool Using Network Processor","authors":"Y. Kitatsuji, S. Katsuno, K. Yamazaki, M. Tsuru, Y. Oie","doi":"10.1109/SAINT-W.2007.43","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.43","url":null,"abstract":"There is an emerging requirement for real-time flow-based traffic monitoring, which is vital for quality of service (QoS) monitoring, anomaly monitoring, and traffic engineering in Internet service provider networks. In this report, we discuss a distributed architecture for real-time and scalable flow monitoring tools and implement a prototype tool using network processor (NP). The contributions of the present paper are two-folds. First, we clarify the elemental functions that are required and commonly used by passive flow monitoring tools, and refine a distribution-processing architecture for combining these functions based on our previous work in order to cope with heavy-load input traffic. Second, we implement the packet distribution component, which plays a core role and might be bottleneck in the proposed architecture, by using pipeline-mode NP hardware, and experimentally prove its applicability to 10 Gbit/s-class input traffic","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending a Secure Autonomous Bootstrap Mechanism to Multicast Security","authors":"N. Okabe, S. Sakane, K. Miyazawa, K. Kamada","doi":"10.1109/SAINT-W.2007.47","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.47","url":null,"abstract":"There are many kinds of control systems, which have been used in industry area, such as process automation (PA) and factory automation (FA). They have numerous sensors and actuators called field devices in their networks, and are introducing Internet protocol (IP) as network technology. Network security is necessary to make the most of IP's capability. The authors have previously studied a security mechanism which can satisfy the restrictions required by control systems and a secure autonomous bootstrap mechanism which is based on the security mechanism. This paper shows an extension of the bootstrap mechanism to support multicast security. The discussion in this paper excludes security of multicast routing protocols and admission control protocols, e.g. IGMP and MLD, because the subject of this paper and those protocols are orthogonal","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Oriented Extension of Attribute Exchange in Shibboleth","authors":"Shoichirou Fujiwara, Takaaki Komura, Y. Okabe","doi":"10.1109/SAINT-W.2007.13","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.13","url":null,"abstract":"In frameworks for Web services like SAML, liberty or Shibboleth, a user can get authentication by asking one's IdP (identity provider) to issue a security assertion by which one can get access to services at an SP (service provider). If the SP additionally requests some attributes of one's, the user is forced to reveal the immediate values of them. There are cases where users must present detailed privacy information which SPs don't actually require to authorize them. We focus on Shibboleth and propose an extension of the attribute exchange protocol between an IdP and an SP in Shibboleth. While in the conventional framework of Shibboleth attributes are exchanged in immediate value, in our extension an SP requests an IdP to test whether user's attributes are satisfied some conditions, then the IdP returns either \"true\", \"false\" or \"unanswerable\" to the SP. We specify a language to describe the conditions as a query at the SP. We also extend an attribute authority at the IdP to evaluate the conditions presented from the SP","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}