2013 16th International Conference on Network-Based Information Systems最新文献

筛选
英文 中文
Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks 基于集群的无线传感器网络中带有移动Sink的非实时数据传输机制
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.63
Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang
{"title":"Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks","authors":"Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang","doi":"10.1109/NBiS.2013.63","DOIUrl":"https://doi.org/10.1109/NBiS.2013.63","url":null,"abstract":"In traditional wireless sensor networks, the sensed data will be forwarded to sink by multi-hop, so that the hot spot problem will happen on the nodes near the sink. The power consumption of these nodes is higher than others, these nodes will be dead sooner. It leads to the network lifetime decreasing. We proposed a data transmission mechanism using mobile sink to solve this problem. We use two threshold values to prevent data overflow. If the data buffer of cluster head exceed to 1st threshold, the node will call sink to come and transmit data. If the sink didn't arrive the transmission range of the node, and the data buffer exceed to 2nd threshold. Instead of forwarding data to sink directly by multi-hop, we use forwarding data to cluster head of neighboring cluster to help buffer the exceeded data. It can decrease the number of node which has to help to help to forward data, so that it can decrease the power consumption of network, and prolong the network lifetime.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federated Identity Access Broker Pattern for Cloud Computing 云计算的联邦身份访问代理模式
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.23
Tim Reimer, P. Abraham, Qing Tan
{"title":"Federated Identity Access Broker Pattern for Cloud Computing","authors":"Tim Reimer, P. Abraham, Qing Tan","doi":"10.1109/NBiS.2013.23","DOIUrl":"https://doi.org/10.1109/NBiS.2013.23","url":null,"abstract":"With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-on environment for services through an identity provider plus sufficient authorization granularity for backend services for the client applications to access. Through detailed discussion of the two standards (SAML 2.0 and OAuth 2.0) this paper presents a study how the two standards can provide a single sign-on solution for cloud computing. Furthermore, by outlining a case study/scenario of the two standards, the Federated Identity Access Broker Pattern for cloud computing is developed to present a solution for these security issues.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop 基于Hadoop的随机自相似性检测异常远程通信
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.43
J. Lee, Sang-Kug Ye, H. Jeong
{"title":"Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop","authors":"J. Lee, Sang-Kug Ye, H. Jeong","doi":"10.1109/NBiS.2013.43","DOIUrl":"https://doi.org/10.1109/NBiS.2013.43","url":null,"abstract":"In recent years, the quantity of teletraffic is rapidly growing because of the explosive increase of Internet users and its applications. The needs of collection, storage, management, analysis, and measurement of the subsequent teletraffic have been emerged as one of very important issues. So far many studies for detecting anomaly teletraffic have been done. However, measurement and analysis studies for big data in cloud computing environments are not actively being made based on Hadoop. Thus, this paper presents for detecting anomaly teletraffic using stochastic self-similarity based on Hadoop. All simulations are conducted under control of our proposed platform, called ATM tool, for anomaly teletraffic intrusion detection system on Hadoop. Our numerical results show that the values of the estimated Hurst parameter obtained from the anomaly teletraffic are much higher when compared to ordinary local area network traffic.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall 柱壁y形分支波导的数值与实验研究
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.84
H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata
{"title":"Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall","authors":"H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata","doi":"10.1109/NBiS.2013.84","DOIUrl":"https://doi.org/10.1109/NBiS.2013.84","url":null,"abstract":"Post wall wave guide and photonic crystal wave guide are important structure for microwave transmission of integrated circuits with multi-layered substrates. It has simple periodic array of metallic or dielectric cylinders between parallel conducting plates for two-dimensional structure. In this study, return loss from branching part in Y-shaped wave guide was evaluated both numerically and experimentally for microwave. We successfully proposed an improvement method by shifting a post location at the branching part to reduce the return loss.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Context and the Cloud: Situational Awareness in Mobile Systems 情境与云:移动系统中的态势感知
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.92
P. Moore, Mak Sharma, F. Xhafa, L. Barolli
{"title":"Context and the Cloud: Situational Awareness in Mobile Systems","authors":"P. Moore, Mak Sharma, F. Xhafa, L. Barolli","doi":"10.1109/NBiS.2013.92","DOIUrl":"https://doi.org/10.1109/NBiS.2013.92","url":null,"abstract":"There has been a paradigm shift in the way users interact with computerized systems and applications. This is driven by the increasing power and ubiquity of 'smart' mobile devices and the traction being generated in Cloud-based systems and the long-term evolution in service provision using Software-as-a-Service. These developments are supported by the rapid and far reaching developments in the related networking infrastructures. This paper considers the nature of Situational Awareness and addresses augmented context, Web 2.0, social media the Internet of Things, and the complexity of context. Mobile networks are considered with large-scale distributed systems and Cloud-based solutions. An illustration of the potential usage of collaborative interactions is presented to demonstrate the benefits which may be derived and the challenges faced. The paper closes with a discussion and conclusions including the identification of future directions for research and open research questions. The paper concludes that augmented context and Situational Awareness forms a central role in the effective provision of services going forward in Cloud-based systems accessed using mobile systems.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure 基于功能信息基础设施的多域功能加密系统的构建
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.19
Y. Niwa, Akira Kanaoka, E. Okamoto
{"title":"Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure","authors":"Y. Niwa, Akira Kanaoka, E. Okamoto","doi":"10.1109/NBiS.2013.19","DOIUrl":"https://doi.org/10.1109/NBiS.2013.19","url":null,"abstract":"Identity-based encryption (IBE) and cryptographic systems based on IBE, timed-release encryption (TRE), attribute-based encryption (ABE), and functional encryption (FE), use information that identify individuals or groups (e.g., identities, attributes) for encryption and decryption. One significant advantage of FE is the fact that identity and attributes management leads to key management. If an infrastructure for managing identity and attributes existed, we could encrypt a message with identity and attributes (Functional Information, FI) for FE on it. With an infrastructure for FE, we can utilize existing FEs issued for FE and reduce the cost of issuing/managing a new FI only for FE. That is, we could regard FE as a service on the infrastructures in order to delegate management of FI to it. For PKG, a conventional IBE player, we propose a framework that divides it into three entities to enable it to correspond with complex FE systems that federate each function among several FE systems. We also examine use cases in which there are more than one instances of each entity in the same domain, and domain-use cases in which each entity coexists under multi-domain, and apply them to multiple FE systems among different domains. Consequently, we discover challenges that are not described in RFC 5408, also referred to as standardization scalability. On the basis of the use cases, to examine the management of these multi-domains, we develop ABE systems on ID management infrastructure with open protocols for authentication/authorization (OAuth and OpenID Connect) and demonstrate the feasibility of the framework in FE.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploratory Coverage in Limited Mobility Sensor Networks 有限移动传感器网络的探索性覆盖
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.30
Mark E. Snyder, S. Chellappan, Mayur Thakur
{"title":"Exploratory Coverage in Limited Mobility Sensor Networks","authors":"Mark E. Snyder, S. Chellappan, Mayur Thakur","doi":"10.1109/NBiS.2013.30","DOIUrl":"https://doi.org/10.1109/NBiS.2013.30","url":null,"abstract":"Autonomous drones are employed with ever increasing frequency in applications ranging from search and rescue, detection of forest fires, and battlefield/ civilian surveillance. In this paper, we study the effects of limited mobility in such mobile sensor platforms, from the perspective of the effect limited mobility has on coverage effectiveness. We define a problem that we call Exploratory Coverage in Limited Mobility Sensor Networks, wherein the objective is to move a number of mobile sensors to fully explore (and hence, sense every point in) a target area in order to detect any critical event that has already occurred in the area. Further, we provide a taxonomy of problems within exploratory coverage as identified by the relationships between sensor range, coverage area, number of sensors, and mobility (range). We then design a purely localized and distributed approximation algorithm for our problem, and provide simulation results to demonstrate the effects of limited mobility on exploratory coverage.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location Privacy Vulnerable from Bluetooth Devices 蓝牙设备的位置隐私易受攻击
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.89
Hiroaki Kikuchi, Takeru Yokomizo
{"title":"Location Privacy Vulnerable from Bluetooth Devices","authors":"Hiroaki Kikuchi, Takeru Yokomizo","doi":"10.1109/NBiS.2013.89","DOIUrl":"https://doi.org/10.1109/NBiS.2013.89","url":null,"abstract":"Bluetooth is a wireless network protocol widely used for many mobile devices. With carrying some Bluetooth devices, individuals are in the risk to be identified without noticing. Many devices are shipped as Bluetooth activated as default. This paper reports the experimental results on scanning Mac address of bluetooth devices and shows the risk of location privacy to be compromised from the bluetooth scanning.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"34 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs 无线传感器网络中移动传感器和静态接收器的性能比较
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.104
L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino
{"title":"Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs","authors":"L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino","doi":"10.1109/NBiS.2013.104","DOIUrl":"https://doi.org/10.1109/NBiS.2013.104","url":null,"abstract":"In this paper, we study the effect of mobile sink and mobile sensors in WSN performance. The WSNs should allow a systematic deployment of sensor nodes including mobility among them. The disseminated data from the sensor nodes are gathered at the sink node. Data dissemination is the major source for energy consumption in WSNs. We consider goodput, depletion and Routing Efficiency (RE) parameters to evaluate the performance of WSNs considering different speeds of mobile sink and sensor nodes. The simulation results show that when the network is congested (Tr is higher), the goodput decreases. For Static Sink (SS) scenario, the difference between evaluation parameters is not too much. For Moving Sink (MS) scenario, the goodput is higher for 10 m/s and RE is higher when moving speed is 5 m/s.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Faster Scalar Multiplication for Elliptic Curve Cryptosystems 椭圆曲线密码系统的快速标量乘法
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.87
Y. Sakemi, T. Izu, Masaaki Shirase
{"title":"Faster Scalar Multiplication for Elliptic Curve Cryptosystems","authors":"Y. Sakemi, T. Izu, Masaaki Shirase","doi":"10.1109/NBiS.2013.87","DOIUrl":"https://doi.org/10.1109/NBiS.2013.87","url":null,"abstract":"In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase showed that the strategy is efficient for ECADD in the projective coordinates. This paper applies Shirase's strategy to ECDBL in the projective coordinates, and to ECADD and ECDBL in the Jacobian coordinates, and evaluates the efficiency of Shirase's strategy for computing a scalar multiplication.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信