Ford-Long Wong, Min Lin, Shishir Nagaraja, I. Wassell, F. Stajano
{"title":"Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern","authors":"Ford-Long Wong, Min Lin, Shishir Nagaraja, I. Wassell, F. Stajano","doi":"10.1109/CNSR.2007.30","DOIUrl":"https://doi.org/10.1109/CNSR.2007.30","url":null,"abstract":"Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes' locations with high temporal and spatial accuracy, such that pseudonym changing and higher-layer obfuscation are insufficient to protect their location privacy. Our contribution is to consider covert beam patterns, generated using multiple antennas to do adaptive beamforming, and so reducing radio signature. We architect such a privacy-enhancing system, give an informal security analysis, and develop an evaluation framework to analyze its location privacy. We performed simulations using wireless LAN parameters, and found that signal-to-noise-ratios for successful direction-finding are more stringent than those required for mere communications. We composed an end-to-end integrated radio and mobility simulation, and compared location privacy performance of omnidirectional versus adaptive beamforming antennas. Our proposal is shown to perform better. In addition, our evaluation framework is flexible and extensible.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps","authors":"Traian Avram, Seungchan Oh, S. Hariri","doi":"10.1109/CNSR.2007.15","DOIUrl":"https://doi.org/10.1109/CNSR.2007.15","url":null,"abstract":"Detecting anomalous events and attacks in the ad-hoc wireless network is a challenging area for research due to the characteristics of wireless network. The proposed detection system monitors network traffic on each node and analyzes collected data by self-organizing maps to extract statistical regularities from the input data vectors and encode them into the weights without supervision. We evaluate our approach to detect network attacks on AODV and DSR protocols using OPNET. Our simulation results show that our approach can accurately detect anomalous behaviors caused by network attacks.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Unfairness in 802.11-basedWireless Mesh Networks","authors":"Li Li, Paul A. S. Ward","doi":"10.1109/CNSR.2007.60","DOIUrl":"https://doi.org/10.1109/CNSR.2007.60","url":null,"abstract":"The use of multi-hop wireless networks based on 802.11 technology is extensive and growing, owing to their ease of deployment and low cost. However, such networks exhibit poor fairness, starving nodes that are too many hops distant from the gateway. The best current solution to this problem is source rate limiting. While effective in many topologies, this fails to completely address the fairness problem. In this paper we investigate this problem of residual unfairness in multi-hop wireless networks that use source-rate limiting. We identify the five necessary conditions for its occurrence, showing that elimination of any of these conditions is sufficient to remove the remaining unfairness. For cases where the conditions are unavoidable, we present two simple changes that can ameliorate the problem, providing on average 30% improvement for the least-rate flow.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounding the Information Collection Performance of Wireless Sensor Network Routing","authors":"Qinghua Wang, Tingting Zhang, S. Pettersson","doi":"10.1109/CNSR.2007.19","DOIUrl":"https://doi.org/10.1109/CNSR.2007.19","url":null,"abstract":"Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In order to support efficient communications for such networks, many routing protocols have been proposed. However, protocol designs are out-pacing formal analysis. We propose an optimization model in this paper to bound the routing performance in terms of network information collection. We first argue that a network can only be given a death sentence when it fails to satisfy the application's requirement and propose a more reasonable network lifetime definition. Then, the optimization model concerning maximizing information collection routing is presented based on this new network lifetime definition. Existing typical routing algorithms: MH, MTE, FA and MREP are simulated as references to validate the model proposed. Results show our model can provide a tight upper bound and thus can be used to evaluate existing and up-coming routing algorithms.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Middleware Architecture for Mobile and Pervasive Large-Scale Augmented Reality Games","authors":"P. Ferreira, J. Orvalho, F. Boavida","doi":"10.1109/CNSR.2007.2","DOIUrl":"https://doi.org/10.1109/CNSR.2007.2","url":null,"abstract":"Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such a high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. Specialized network middleware solutions for large scale mobile and pervasive augmented reality games are, to our knowledge, inexistent. The work presented in this paper focuses on the creation of such type of network middleware for mobile and pervasive entertainment, applied to the area of large scale augmented reality games. In this paper we describe the architecture of the system, which works over a 3GPP network. The paper presents architectural and implementation aspects, along with evaluation results. The results show that the proposed solution is able to cope with the stringiest requirements of augmented reality systems.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Monitoring using Wireless Sensors and Controller Area Network","authors":"Gregory Jaman, S. Hussain","doi":"10.1109/CNSR.2007.59","DOIUrl":"https://doi.org/10.1109/CNSR.2007.59","url":null,"abstract":"This paper investigates implementation and design issues for a heterogeneous network for structural monitoring. The proposed application uses wireless sensors and the controller area network (CAN) to provide energy efficient monitoring. The contributions include: implementation of the PIC18f4680 platform in TinyOS, creating a message protocol over CAN, and developing a sensor board.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Interference in Uplink SDMA SC-FDE system","authors":"F. Siddiqui, F. Danilo-Lemoine, D. Falconer","doi":"10.1109/CNSR.2007.45","DOIUrl":"https://doi.org/10.1109/CNSR.2007.45","url":null,"abstract":"In this paper, the issue of channel estimation with multiple in-cell co-channel users (ICUs) in the presence of out of cell interferers (OCIs) is addressed. A single carrier frequency domain equalization (SC-FDE), uplink space division multiple access (SDMA) system with iterative block decision feedback equalization (IBDFE), based on the soft decisions is considered. To overcome the intra-cell interference, it is shown that if orthogonality between users during their training phase is assured, then good performance is achievable compared to non-orthogonal training. Moreover, we have shown that the way to multiplex the training either in time or frequency, does not affect the performance in time-variant channels as long as the orthogonality is maintained. It is also shown that inter- cell interference could be mitigated with a combination of in-cell orthogonal pilots, spatial diversity and iterative receiver processing. Performance improvement by an IBDFE based on the soft decisions is also shown.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evolutionary Solution for Cross Layer Ad Hoc Connectivity Selection","authors":"M. Borschbach, M. Vodel","doi":"10.1109/CNSR.2007.14","DOIUrl":"https://doi.org/10.1109/CNSR.2007.14","url":null,"abstract":"The physical connectivity of ad hoc networks has gained the importance of a challenging problem for the efficiency of the routing and the link layer management. The application of an appropriate network description proposed in this paper provides the opportunity to realize local neighbor selection rules which are superior to related work in this field under the networking aspect of the over all sum of shortest paths. The remaining network topology is compared to the main approaches of ad hoc connectivity in an empirical simulation study. To minimize the computational complexity of the neighbor selection optimization constraints, a specific evolutionary operation design is used.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE802.16/WiMAX-Based Broadband Wireless Networks: Protocol Engineering, Applications, and Services","authors":"E. Hossain","doi":"10.1109/CNSR.2007.37","DOIUrl":"https://doi.org/10.1109/CNSR.2007.37","url":null,"abstract":"IEEE 802.16/WiMAX-based broadband and mobile wireless access is expected to be a significant component in the next generation (e.g., beyond 3G, 4G) wireless systems. IEEE 802.16/WiMAX standard, which incorporates several advanced radio transmission technologies such as orthogonal-frequency division multiplexing (OFDM), adaptive modulation and coding, and adaptive forward error correction (FEC), is designed to provide broadband wireless capability using a well-defined quality-of-service (QoS) framework. Therefore, this is a promising technology for wireless services requiring high- rate transmission (in the range of tens of Mbps) and strict QoS requirements in both indoor and outdoor environments. This technology is currently of big interest to researchers and practitioners involved in the design, analysis, installation, and management of mobile broadband wireless access systems and networks. The objective of this tutorial is to provide a complete overview on the IEEE 802.16/WiMAX standard and the current state-of-the-art research on the design, analysis, and optimization of IEEE802.16/WiMAX-based networks. The key technical challenges related to protocol engineering in these networks are described. The aim is to provide a survey on the emerging IEEE 802.16/WiMAX technology rather than an in-depth study on a specific protocol engineering problem. An overview of the different evolutions of the IEEE 802.16/WiMAX standard broadband wireless access (BWA) is presented and the open research issues in protocol engineering (e.g., for radio resource management, mobility support, security) are identified. A comprehensive survey on radio resource management, traffic scheduling, admission control, mobility management, and security mechanisms for IEEE 802.16/WiMAX are provided. A comparative performance study among the third-generation (3G) and the IEEE 802.16-based systems is provided. Several applications (e.g., wireless telemedicine and e-health services), services and deployment scenarios are described and the necessary protocol design and engineering issues are outlined.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Assessing Data Quality of Ontology Matching on the Web","authors":"O. Vorochek, Y. Biletskiy","doi":"10.1109/CNSR.2007.68","DOIUrl":"https://doi.org/10.1109/CNSR.2007.68","url":null,"abstract":"Nowadays the semantic Web is a leading Web technology, which enables semantic interoperability between structurally and semantically heterogeneous web sources and web users. Ontologies are a key of semantic interoperability and the main vehicle of the development of the semantic Web. One of the most challenging and important tasks of ontology engineering is integration of ontologies because with the purpose to built a common ontology for all Web sources and consumers in a domain. The present paper describes an approach of assessing data quality of ontology matching that allows evaluating correctness of mapping concepts and relationships from one ontological fragment to another. The purpose of correct mapping is to find identical and synonymous concepts and relationships in ontologies facilitating their integration to a common ontology, which serves as a base for attaining interoperability.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124528349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}