2011 4th IFIP International Conference on New Technologies, Mobility and Security最新文献

筛选
英文 中文
Beamforming with Partial Channel Knowledge 部分信道知识的波束形成
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-08-29 DOI: 10.1109/NTMS.2011.5720622
S. Shilo, A. Weiss, A. Averbuch
{"title":"Beamforming with Partial Channel Knowledge","authors":"S. Shilo, A. Weiss, A. Averbuch","doi":"10.1109/NTMS.2011.5720622","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720622","url":null,"abstract":"Multiple antenna techniques are used to enhance wireless links and therefore have been studied extensively. Many practical systems differ from ideal schemes which have been discussed in the literature. One example is a system that lacks precise channel information at the transmitter. We evaluate analytically the performance of a multiple input multiple output (MIMO) technique that uses partial channel knowledge. Specifically, we analyze a suboptimal M X N scheme employing Eigenbeamforming at the transmitter and MRC at the receiver, assuming only partial channel matrix is known to the transmitter, specifically only P out of N rows of the channel matrix are known. We show that the diversity order of such a scheme is MP+N-P and further show that increasing the value of P by one increases the diversity order by M-1. We also derive the array gain for this scheme. All the results are supported by simulations.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Several Characteristics of Active/Sleep Model in Wireless Sensor Networks 无线传感器网络中主动/休眠模型的几个特点
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5721073
W. Li
{"title":"Several Characteristics of Active/Sleep Model in Wireless Sensor Networks","authors":"W. Li","doi":"10.1109/NTMS.2011.5721073","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5721073","url":null,"abstract":"We investigate several characteristics of active/sleep model in wireless sensor networks (WSNs). Here, each node of the investigated WSN may be randomly and alternatively in an ACTIVE status or a SLEEP status. When a referenced sensor node is in an ACTIVE status, it may generate data packets with a given stochastic process and may transmit/receive a data packet with a random period of time. However, when the referenced sensor node is in a SLEEP status, it may only be able to stochastically generate date packets but not transmit/receive. If all possible next-hop nodes of the referenced node are in SLEEP statuses, we will say the environment of the referenced node to be in an OFF period. If there exists at least one next-hop node of the referenced node to be in ACTIVE status, we will say that its environment is in an ON period. In this shorter paper, we first derive the steady-state probability distribution of number of data packets in the referenced node and then obtain the distribution function for a node to be in an ON period and in an OFF period, respectively. The novelty of this note is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above two performance characteristics. These results are expected to be useful as the fundamental results in the theoretic analysis and design of various WSNs with active and sleep status consideration.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Design of Wireless Sensor System for Neonatal Monitoring 新生儿监测无线传感器系统的设计
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5721146
Wei Chen, S. T. Nguyen, S. Bouwstra, R. Coops, L. Brown, Sidarto Bambang-Oetomo, L. Feijs
{"title":"Design of Wireless Sensor System for Neonatal Monitoring","authors":"Wei Chen, S. T. Nguyen, S. Bouwstra, R. Coops, L. Brown, Sidarto Bambang-Oetomo, L. Feijs","doi":"10.1109/NTMS.2011.5721146","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5721146","url":null,"abstract":"In this paper, we present the application of wireless sensor technology and the advantages it will inherently have for neonatal care and monitoring at Neonatal Intensive Care Units (NICU). An electrocardiography (ECG) readout board and a wireless transceiver module developed by IMEC at the Holst Centre in the Netherlands are embedded in the proposed wireless sensor systems in combination with the signal processing and software interface developed at the Department of Industrial Design, Eindhoven University of Technology (TU/e). Through development of this prototype system, we opt to ensure correct data transmission, detection and display. The wireless system is designed to be suitable for integration into non-invasive monitoring platforms such as a smart neonatal jacket developed at TU/e. Experiments at Maxima Medical Centre (MMC) in Veldhoven, the Netherlands demonstrate the wireless transmission of ECG data from the smart jacket integrated with textile electrodes.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"876 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122706297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluation of Path Loss Models at WiMAX Cell-Edge WiMAX Cell-Edge中路径损耗模型的评估
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5721070
Mohammed Alshami, T. Arslan, J. Thompson, A. Erdogan
{"title":"Evaluation of Path Loss Models at WiMAX Cell-Edge","authors":"Mohammed Alshami, T. Arslan, J. Thompson, A. Erdogan","doi":"10.1109/NTMS.2011.5721070","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5721070","url":null,"abstract":"WiMAX coverage range is one of the important factors that will affect the quality of broadband access services in mobile systems. Predicting and finding the path loss is essential in planning and designing cellular mobile systems. This paper presents a comprehensive study of path loss on mobile WiMAX which has been developed to provide high throughput and wide coverage to a large number of users. In this paper we have calculated, analyzed, compared the path loss values and determined the link budget, power outage probability and WiMAX cell coverage area. We consider the mobile WiMAX standard at one carrier frequency, namely 3.5GHz and a variation of distances in the range of 1 to 50 km, in flat rural, suburban and urban environments. The paper discusses and implements Okumura, Hata, Cost- 231, Ericsson, Erceg, Walfish, Ecc-33, Lee and the simplified free space path loss models. All the models applied in this paper are used to predict the propagation loss at WiMAX cell-edge.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122860407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Distributed Resource Allocation Mechanism for SOA Service Level Agreements SOA服务水平协议的分布式资源分配机制
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5720607
Kostas Katsalis, L. Tassiulas, Y. Viniotis
{"title":"Distributed Resource Allocation Mechanism for SOA Service Level Agreements","authors":"Kostas Katsalis, L. Tassiulas, Y. Viniotis","doi":"10.1109/NTMS.2011.5720607","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720607","url":null,"abstract":"Enterprise computing facilities, such as data centers or server farms typically employ service-oriented architectures (SOA) to support multiple, XML-based Web Services. They are typically architected in multiple computing tiers, in which one tier is used for, say, offloading the CPU-intensive XML processing onto a cluster of (potentially virtual) middle-ware appliances. Service differentiation in enterprise networks addresses the issues of managing the enterprise network resources in order to achieve desired performance objectives. In this paper, we define a dynamic algorithm that manages allocation of CPU time in the appliance tier. We evaluate the service differentiation capabilities of this algorithm via simulations.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Agile Service Platform for Telecommunication Environments 面向电信环境的敏捷服务平台
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5720648
L. Lange, Alexander Blotny, T. Magedanz
{"title":"An Agile Service Platform for Telecommunication Environments","authors":"L. Lange, Alexander Blotny, T. Magedanz","doi":"10.1109/NTMS.2011.5720648","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720648","url":null,"abstract":"A framework for lowering the borders of service delivery and service composition in telecommunication networks is proposed in this work. In our opinion such an agile framework is needed for two main reasons. At first the cycle of introducing new services in the telecommunication industry usually takes several months, while the general cycles in the Web domain are much faster. Besides, customers want to use a flexible amount of services from different kinds of sources (e.g. Google, Facebook). The proposed agile service environment is intended to interact with services of the traditional telecommunication industry and is enabling the third party development process to support services coming from all kind of domains. Service platforms for Next Generation Networks adapting the principles of Service Oriented Architectures and the initial steps in the standardization towards service delivery frameworks are done. Special requirements that have to be considered are aspects of service life-cycle management and service composition that are critical regarding high performing real-time communication processes as needed in a telecommunications environment. Beyond the requirements of dynamic service deployment, management, evolution and service termination there is the intention of a well performing agile service composition mechanism. In order to fulfill the discussed requirements some related work in this area is presented and the promising IT / Network standards are enlightened. Furthermore, the architectural design of the developed framework is presented. Finally the paper demonstrates a practical use case scenario that shows the dynamic integration and combination of telecommunication services with services of the Web domain.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Autonomic Piloting Virtual Network Architecture 迈向自主导航虚拟网络架构
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5720639
Ilhem Fajjari, M. Ayari, Othmen Braham, G. Pujolle, H. Zimmermann
{"title":"Towards an Autonomic Piloting Virtual Network Architecture","authors":"Ilhem Fajjari, M. Ayari, Othmen Braham, G. Pujolle, H. Zimmermann","doi":"10.1109/NTMS.2011.5720639","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720639","url":null,"abstract":"The Internet has known an impressive success in the three last decades. Nonetheless, due to its size and scope, this large network has become victim of its own success. Innovative approaches are required to overcome the shortfalls of current systems and to design Next Generation Internet. In this context, network virtualization presents a viable solution to deal with the current Internet impasse. It provides a promising way to deploy different network architectures and protocols over a shared physical infrastructure. However, in spite of its multiple advantages, network virtualization adds more complexity on network systems. A promising solution to address this huge complexity consists on developing systems which are capable of managing themselves, called autonomic computing systems or self-* systems. This paper proposes an agent-based autonomic framework which is able to self manage virtual resources. We provide a detail description of the proposed autonomic architecture and we focus on a real testbed implementation and testing of our framework. Experiment results show the ability of our system to self-configure its resources in order to maintain a required QoS level.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementation of Complex Strategies of Security Insecure Embedded Systems 不安全嵌入式系统复杂安全策略的实现
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5721145
B. Robisson, M. Agoyan, S. Henaff, Patrick Soquet, G. Phan, F. Wajsbürt, P. Bazargan-Sabet
{"title":"Implementation of Complex Strategies of Security Insecure Embedded Systems","authors":"B. Robisson, M. Agoyan, S. Henaff, Patrick Soquet, G. Phan, F. Wajsbürt, P. Bazargan-Sabet","doi":"10.1109/NTMS.2011.5721145","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5721145","url":null,"abstract":"Secure components are subject to physical attacks whose aim is to recover the secret information that they store. Most of works which aim to protect these components generally consist in developing protections (or countermeasures) taken one by one. But this \"countermeasure-centered\" approach drastically decreases the performances of the whole chip in terms of power and speed. Our work is complementary and consists in reorganising a given set of existing countermeasures in order to optimise both the security and the availability of the circuit without reducing its global performances. The proposed solution is based on a double-processor architecture and on mechanisms to parametrise the hardware and software countermeasures. One processor embeds the state-of-the-art set of countermeasures and executes the application code. The second processor, much smaller, applies the strategy of security (i.e the response of the circuit when a security event arises), but without sharing sensitive data with the first processor. We show that our approach enables the secure circuit's designer to easily fine tune the strategy of security, for example, of Pay-TV applications and could, in the future, be used to optimise dynamically the trade-off between performance and security.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Performance Implementation of Snow3G Algorithm in Memory Limited Environments 内存有限环境下Snow3G算法的高性能实现
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5720611
Vaidyanathan Jairaj, Jaakko Pohjonen, Konstantin Shemyak
{"title":"High Performance Implementation of Snow3G Algorithm in Memory Limited Environments","authors":"Vaidyanathan Jairaj, Jaakko Pohjonen, Konstantin Shemyak","doi":"10.1109/NTMS.2011.5720611","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720611","url":null,"abstract":"SNOW 3G is a stream cipher which forms the basis of the ciphering and integrity protection algorithms that have been mandated by 3GPP for protection of data over the air interface. The software implementation of this cipher is known to run very fast if a lookup table based approach is used. However, the use of look up tables introduces a need for 10 kB of memory to achieve optimal performance. This paper describes how the symmetry in the look up tables can be exploited in software implementation that uses only 4 kB of memory, without any significant loss in performance.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130501484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel OverCovert:使用堆栈溢出软件漏洞创建隐蔽通道
2011 4th IFIP International Conference on New Technologies, Mobility and Security Pub Date : 2011-02-28 DOI: 10.1109/NTMS.2011.5720645
T. Fatayer, S. Khattab, F. Omara
{"title":"OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel","authors":"T. Fatayer, S. Khattab, F. Omara","doi":"10.1109/NTMS.2011.5720645","DOIUrl":"https://doi.org/10.1109/NTMS.2011.5720645","url":null,"abstract":"Abstract-Attackers exploit software vulnerabilities, such as stack overflow, heap overflow, and format string errors, to break into victim machines and implant backdoors to maintain access. They typically use obfuscation techniques, such as encryption and covert channels, to hide their command-and-control traffic and avoid detection. In this paper, we show how a vulnerable program can be used to create a covert channel that allows an entity (e.g., an attacker) to stealthily send information to another remote entity (e.g., a backdoor). The proposed covert channel, for which we coin the term OverCovert, is based on the common return-to-libc stack-overflow attack and the address space layout randomization defense. We implemented a proof-of-concept of OverCovert under Linux and evaluated its throughput sending files of different formats. We also propose and analyze techniques to improve channel undetectability and throughput.","PeriodicalId":270249,"journal":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信