Future Generation Communication and Networking (FGCN 2007)最新文献

筛选
英文 中文
Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol 基于加密认证协议的RFID标签数字编解码器设计
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.105
Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang
{"title":"Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol","authors":"Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang","doi":"10.1109/FGCN.2007.105","DOIUrl":"https://doi.org/10.1109/FGCN.2007.105","url":null,"abstract":"In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 mum standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Home Device Authentication Method Based on PKI 基于PKI的家庭设备认证方法
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.143
Yun-kyung Lee, Deok-Gyu Lee, J. Han
{"title":"Home Device Authentication Method Based on PKI","authors":"Yun-kyung Lee, Deok-Gyu Lee, J. Han","doi":"10.1109/FGCN.2007.143","DOIUrl":"https://doi.org/10.1109/FGCN.2007.143","url":null,"abstract":"As home network service is popularized, the kind of smart device is rising up and home appliances are becoming intelligent. Device authentication process is necessary that we safely use these devices and construct secure home network environment. In this paper, we proposed home device authentication framework and home device certificate profile. And also we describe home device registration process and home device certificate issuing process. Our home device certificate profile is based on the internet X.509 version 3 certificate. And our device authentication framework adheres to basic concept of general PKI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on a Model of Context-driven Similarities Computation between Data Objects 一种上下文驱动的数据对象相似度计算模型研究
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.192
Haixue Liu, Zhao Lv, Junzhong Gu
{"title":"Research on a Model of Context-driven Similarities Computation between Data Objects","authors":"Haixue Liu, Zhao Lv, Junzhong Gu","doi":"10.1109/FGCN.2007.192","DOIUrl":"https://doi.org/10.1109/FGCN.2007.192","url":null,"abstract":"A practical problem that has been more and more acknowledged is how to measure similarities of data objects. With high interconnectivity to heterogeneous information sources, the primary issue in many applications such as retrieval, interoperability, etc, is focused on determining which data is relevant. Many methods for measuring have been investigated. We propose a complementary approach, based on context information to enhance \"understanding\" of object-to-object associations, which measures similarities of data objects that are an abstraction from real world. In our method, confidence level on similarities can be greatly improved by \"observing\" data objects from multi-perspectives. It is also demonstrated by our experiments that this approach is effective as compared to other computation approaches.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Numerical Methods for Efficient and Reliable Segmentation 高效可靠分割的新数值方法
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.171
Hongseok Choi, Seongjai Kim
{"title":"Novel Numerical Methods for Efficient and Reliable Segmentation","authors":"Hongseok Choi, Seongjai Kim","doi":"10.1109/FGCN.2007.171","DOIUrl":"https://doi.org/10.1109/FGCN.2007.171","url":null,"abstract":"This article is concerned with efficiency and reliability issues related to level set-based segmentation methods. Geometric active contour methods show some desirable characteristics: flexibility in the topological changes of contours, capability of detecting interior boundaries, and a low sensitivity to noise. However, they tend to detect undesired boundaries when applied to general images. In order to overcome the drawback, we introduce the method of background subtraction (MBS), which transforms a general image to an essentially binary image and therefore conventional segmentation methods can detect desired edges more effectively. An effective initialization technique for the level set function and a hybridization of information from both the intensity and statistical properties (distributions) are also introduced to improve efficiency and reliability of level set-based segmentation methods. The resulting algorithm has proved to locate the desired edges in 2-4 iterations, for various images.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"54 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation 防止移动Ad Hoc网络中的协同黑洞攻击:仿真实现与评估
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.184
H. Weerasinghe, Huirong Fu
{"title":"Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation","authors":"H. Weerasinghe, Huirong Fu","doi":"10.1109/FGCN.2007.184","DOIUrl":"https://doi.org/10.1109/FGCN.2007.184","url":null,"abstract":"A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In S. Ramaswamy et al. (2003), we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-to-end delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in S. Ramaswamy et al. (2003) presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution can accurately prevent the cooperative black hole attacks. The example findings are: (1) the proposed scheme presents 5 - 8% more communication overhead of route request; and (2) The secure route discovery delay slightly increases the packet loss percentage.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 216
An Analysis of RFID Tag Authentication Protocols Using Secret Value 基于秘密值的RFID标签认证协议分析
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.55
Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim
{"title":"An Analysis of RFID Tag Authentication Protocols Using Secret Value","authors":"Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim","doi":"10.1109/FGCN.2007.55","DOIUrl":"https://doi.org/10.1109/FGCN.2007.55","url":null,"abstract":"RFID (Radio Frequency Identification) system is contactless automatic identification system used by small and low-cost RFID tag. An RFID tag can be stuck on or incorporated into a product, animal, or person and identify tag information by using radio frequency. RFID system will be able to replace barcode system for many merits. But the most important problem of RFID system is that unauthorized readers can access to tag information, which should be possible to produce privacy problem. Presently many researches about RFID tag authentication for solving privacy problem are going on, but these researches have many difficulties for limited hardware resource. In this paper, we analyzed RFID tag authentication protocols using secret value of many proposed. And we also dealt with many problems in the protocols and propose the future research for problem solving.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Ordered HARQ Scheme for LDPC-Coded OFDM System ldpc编码OFDM系统的有序HARQ方案
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.67
Xuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang
{"title":"An Ordered HARQ Scheme for LDPC-Coded OFDM System","authors":"Xuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang","doi":"10.1109/FGCN.2007.67","DOIUrl":"https://doi.org/10.1109/FGCN.2007.67","url":null,"abstract":"In this paper, an ordered Hybrid ARQ(HARQ) scheme for LDPC-coded OFDM system is presented , in which the important bits with large degrees have high retransmission priorities and are mapped to the sub-carriers with better CQI levers in OFDM system. The new scheme considers the degree distribution property of LDPC codes and improved the system performance by providing the important bits with more protection. The performance of the new scheme has been investigated by the Gaussian Approximation (GA). The analysis and simulation results prove that the new scheme is practical because it has better performance with low system complexity.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of TCP over Wireless Network Using Error Model 基于错误模型的无线网络TCP性能分析
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.180
Yu-Doo Kim, Il-Young Moon, Heau-Jo Kang
{"title":"Performance Analysis of TCP over Wireless Network Using Error Model","authors":"Yu-Doo Kim, Il-Young Moon, Heau-Jo Kang","doi":"10.1109/FGCN.2007.180","DOIUrl":"https://doi.org/10.1109/FGCN.2007.180","url":null,"abstract":"TCP (Transmission Control Protocol) is one of the protocols which are widely used from the Internet environments. Through the flow control of TCP, it could be increased efficiency for the loss and a retransmission of data and the flow control become accomplished though window technique which puts the limit of size. By the flow control, TCP divided in various versions. In this paper, it is analyzed the simulation result which applies the error model over wireless network in the Newreno which is an improved model of the representative Tahoe, Reno.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering Methodology and Scenario to Detect Covert Database System 发现隐蔽数据库系统的方法和场景
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.106
G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee
{"title":"Discovering Methodology and Scenario to Detect Covert Database System","authors":"G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee","doi":"10.1109/FGCN.2007.106","DOIUrl":"https://doi.org/10.1109/FGCN.2007.106","url":null,"abstract":"When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
RFID Based Object Localization System Using Ceiling Cameras with Particle Filter 基于RFID的粒子滤波天花板相机目标定位系统
Future Generation Communication and Networking (FGCN 2007) Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.194
Prachya Kamol, S. Nikolaidis, R. Ueda, T. Arai
{"title":"RFID Based Object Localization System Using Ceiling Cameras with Particle Filter","authors":"Prachya Kamol, S. Nikolaidis, R. Ueda, T. Arai","doi":"10.1109/FGCN.2007.194","DOIUrl":"https://doi.org/10.1109/FGCN.2007.194","url":null,"abstract":"In this paper, we propose an object localization method for home environments. This method utilizes RFID equipments, a mobile robot and some ceiling cameras. The RFID system estimates a rough position of each object. The autonomous robot with RFID antennas explores the environment so as to detect other objects on the floor. Each object that is attached an RFID tag, is then recognized by utilizing its feature information stored in this tag. Finally, the precise localization of each object is achieved by the ceiling cameras with particle filters. The accuracy and the robustness of the proposed method are verified through an experiment.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信