{"title":"A Conceptual Framework for a SIM-based Electronic Transaction Authentication System","authors":"M. Ashraff, M. Kabir, S. M. Aziz, B.k. Dey","doi":"10.1109/NPC.2007.154","DOIUrl":"https://doi.org/10.1109/NPC.2007.154","url":null,"abstract":"This paper presents a SIM-based tool for user authentication in various service areas such as financial transactions in e-commerce. Other remote services can use SIM as an authentication tool over existing GSM technology through GPRS, which is an additional packet data feature for the GSM network. It allows both packet-switched and circuit-switched traffic to exist in the GSM infrastructure. As GPRS is designed to support packet based protocols, such as the Internet Protocol (IP) based bursty and uneven traffic flow, it enables new services such as reasonably fast access to the Internet, electronic mail and other data oriented services, that have been too inefficient in traditional circuit-switched digital mobile networks. Using GPRS features, the e-commerce applications can use SIM as user authentication for transactions. SIM can also be a tool for user identity and authentication around the corporate intranets. This can reduce security infrastructure setup and investment overhead for the security concerned organizations. This paper depicts an electronic payment protocol by means of SIM based authentication with the illustrations of its formal modelling & verification results.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Algorithm of Channel Resource Allocation in IEEE 802.11 WLAN","authors":"Liu Yanbing, Zhai Congcong, Sun Shixin","doi":"10.1109/NPC.2007.180","DOIUrl":"https://doi.org/10.1109/NPC.2007.180","url":null,"abstract":"With the development of bandwidth wireless communications, MAC protocol in IEEE 802.11 can't satisfy user-individual quality of service (QoS) guarantees effectively and can't support high-speed mobility. A novel algorithm for channel allocation in bandwidth WLAN and an improved resource reservation mechanism applied into IEEE 802.11 MAC protocol are proposed in this article. The simulated results indicate that the advanced protocol makes the system throughput improved and delay decrease. Moreover, the improved system shows an excellent performance in the environment with high-speed mobility.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131271874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation Method for Level of Detail (LOD) of 3D contents","authors":"Hakran Kim, Yongik Yoon, Hwajin Park","doi":"10.1109/NPC.2007.82","DOIUrl":"https://doi.org/10.1109/NPC.2007.82","url":null,"abstract":"In this research we present a method for adaptation of 3D contents over ubiquitous environment. The need of contents adaptation and delivery is growing to support multiple target platforms for single source. Since contents base on computer graphics deal with a large data set and a high performance, a service adaptation for context changing is required to manipulate graphics contents with a more complicated method in multiple devices such as desktops, laptops, PDAs, mobile phones, etc. This paper presents some theoretical method for adaptation, which is service rendering middleware, and device-based decision making algorithm for LOD of 3D contents. Service rendering middleware consists of service adaptation (SA) for analyzing environments, service rendering (SR) for reconfiguring customized services and LOD algorithm for generating an adapted service by processing customized data according to the level of detail. Also, the decision-making algorithm, which is based on device capabilities, is used both in LOD algorithm module and method to decide level of 3D contents.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing","authors":"Changqing An, Shijin Kong, Jiahai Yang","doi":"10.1109/NPC.2007.119","DOIUrl":"https://doi.org/10.1109/NPC.2007.119","url":null,"abstract":"This paper proposes a scalable algorithm called APD (adaptive packet dropping) for bandwidth control, which is based on active queue. A flow is mapped to an entry of hash table by hash function, and the counter of a flow can be searched at O(I) time. Theoretical analysis and experiments indicate that APD algorithm has great advantages on speed and space and it can reach predictable accuracy on flow bandwidth control. Theoretical analysis is also used to predict the accuracy for miscellaneous data-flow sizes distribution. A bandwidth control system is realized based on Linux 2.6 kernel. The experimental results show that the system can work properly on gigabit links while keeping enough accuracy on flow based bandwidth control.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Elliptic Curves Scalar Multiplication for Wireless Network","authors":"Bangju Wang, Huanguo Zhang, Yuhua Wang","doi":"10.1109/NPC.2007.43","DOIUrl":"https://doi.org/10.1109/NPC.2007.43","url":null,"abstract":"Mobile and wireless devices like cell phones and network enhanced PDAs have become increasingly popular in recent years. The security of data transmitted via these devices has become the bottleneck for wireless network. Elliptic curves cryptography (ECC) is especially attractive for devices and is suited for wireless network, which has restrictions of the limited bandwidth, processing power, storage space and power consumption. The efficiency of ECC implementation is highly dependent on the performance of arithmetic operations of scalar multiplication(SM) dP, which mainly applied in encryption, signature and protocol. A new signed binary representation (SBR) for integers is proposed, which needs less memory and cost of computation compared to other methods mentioned in this paper. According to analyzing and comparing to other methods, algorithm for computing dP using new SBR is more efficient in window methods and is the simplest for applying in software and hardware. The new SBR needs less computational power and memory and can improve the security of wireless network efficiently.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Kademlia Protocol In a VoIP System","authors":"Xiao Wu, Cuiyun Fu, Huiyou Chang","doi":"10.1109/NPC.2007.168","DOIUrl":"https://doi.org/10.1109/NPC.2007.168","url":null,"abstract":"Kademlia, which has been widely used in file sharing systems such as eMule and Overnet, concerns mainly on the resources and prefer to locate precisely the right peers despite of time consuming. We proposed an improved Kademlia protocol to adapt to VoIP systems meeting the need of real-time audio service and establishing a conversation in short delay. Beside, to provide an effective circuit switching we present timely backup channel for each peer to rescue interrupted conversation.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building IPsec VPN in IPv6 Based on Openswan","authors":"Liu Lian, Gao Wen-mei","doi":"10.1109/NPC.2007.50","DOIUrl":"https://doi.org/10.1109/NPC.2007.50","url":null,"abstract":"This paper researches and analyses feature and advantages of IPsec VPN, points out its problem and disadvantages in the IPv4. After analyzing IPv6 network and its data package in deep, this paper studies the feasibility of implementation of IPsec VPN in IPv6 network. Then it elaborates frame and modules which supports IPv6 of Openswan. Via recompiling the 2.6 kernel, adding the NETKEY module to kernel, installing Openswan and configuring it, a IPsec VPN which can runs in pure IPv6 network has been built. Finally, function and performance testing is done.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of an Attribute-managed Storage-cluster Based on TCP/IP Network","authors":"Qinqi Wei, Changsheng Xie, Xu Li, Q. Cao","doi":"10.1109/NPC.2007.14","DOIUrl":"https://doi.org/10.1109/NPC.2007.14","url":null,"abstract":"With the growing scale of storage system, its requirements of performance, reliability, availability, and security are getting more and more complicated. The costs to manage storage systems will keep increasing and finally be higher than the systems themselves if this trend continues. Thus, intelligent and self-managing systems are required to automatically address the needs of these requirements. The proposed attribute-managed method in this paper describes and classifies the requirements of storage system with attributes, relating the attributes with certain access and storage strategies. Data are accessed and stored with the most appropriate strategies according to attributes pertaining to them. We finally present a prototype of an attribute-managed storage-cluster based on TCP/IP network with extensions to existing protocols and discuss the implementation structure in detail as part of this research.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of a New Web Server Cluster Architecture Supporting QoS","authors":"Wu Yang, Shuangqing Li, Daijie Cheng","doi":"10.1109/NPC.2007.90","DOIUrl":"https://doi.org/10.1109/NPC.2007.90","url":null,"abstract":"A new Web server cluster architecture with high scalability and reliability which supports Web QoS is proposed. The functions previously concentrated on a single dispatcher are distributed in this architecture, the traffic bottleneck of the dispatcher is alleviated, and the single point fault of dispatcher is avoided, so the scalability and reliability of the cluster system can be enhanced. Accessing locality on server is guaranteed by synchronous load transferring. The load balancing among the servers is achieved through a mechanism based on load vector. By measuring in experimental system, the increasing of throughput has linear relationship with the number of servers. So the QoS of the whole system is guaranteed.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In-Sik Cho, Man Ju Lee, T. S. Yun, Jung Ah Kim, Pho Due Giang, Sungyoung Lee
{"title":"A Highly Reliable Access Control Model for Ad Hoc Networks","authors":"In-Sik Cho, Man Ju Lee, T. S. Yun, Jung Ah Kim, Pho Due Giang, Sungyoung Lee","doi":"10.1109/NPC.2007.96","DOIUrl":"https://doi.org/10.1109/NPC.2007.96","url":null,"abstract":"Unlike the conventional networks, the unique characteristics of mobile ad hoc networks (MANETs) pose a number of nontrivial challenges for pervasive service provision. Particularly, mobility of users/devices causes un-predefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing a security access control model. Alternatively, there is generally no a priori trust relationship among entities interacting in ad hoc networks which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this study, we show how trust evaluation process of a system can be based on previous interactions and peer recommendations. Regarding the combination of these two factors, our trust-aware access control model can establish appropriate trust values for different situations, providing a confident supervision mechanism for ad hoc users.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128208177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}