S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe
{"title":"A translation method between 802.15.4 nodes and IPv6 nodes","authors":"S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe","doi":"10.1109/SAINT-W.2006.3","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.3","url":null,"abstract":"There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication between both technologies is important, though it is not easy for IEEE 802.15.4 packet to carry IPv6 packet due to its limited features. This paper shows a translation method between IPv6 nodes and IEEE 802.15.4 nodes","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extendable product traceability system from small start","authors":"S. Wakayama, Yusuke Doi, S. Ozaki, Atsushi Inoue","doi":"10.1109/SAINT-W.2006.18","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.18","url":null,"abstract":"A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databases and ID-hash values. We have evaluated the proper operation of this system with a trial system and plan to analyze its qualitative behavior through large-scale experiments","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-aware, ontology-based recommendations","authors":"C. Räck, S. Arbanowski, S. Steglich","doi":"10.1109/SAINT-W.2006.13","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.13","url":null,"abstract":"In this paper we study the synergy between user behavior, context data, and semantic information in order to enable future services to adapt to different situations based on the recommendations of a service-independent recommender. Therefore, we propose a system that delivers context-aware recommendations, which are based on provided feedback, context data, and an ontology-based content categorization scheme. We provide a detailed overview of the specification, a short description of a possible service scenario and a discussion of the results","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental study on UHF passive RFID readability degradation","authors":"J. Mitsugi, H. Hada","doi":"10.1109/SAINT-W.2006.17","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.17","url":null,"abstract":"Readability of passive RFID fundamentally depends on the tag empowering. The minimum required power, usually referred to as sensitivity, depends on the chip and antenna manufacturing. The sensitivity affects the readability but it is not the sole determinant of readability. The readability of RFID comprises a number of factors, particularly in the UHF band. This paper proposes a classification of tag readability degradation factors and measurement methods to quantify the factors. It is shown that tag performance change at the attachment may affect the readability. A tag probe, a power measurement antenna at the position of tag attachment, can monitor essential data to comprehend the situation and establish a countermeasure to improve the tag readability. The operating environment, involving reader antenna positions and standing waves result from the multipath fading, is another important factor for the readability. The characteristics of the environment could be also grasped by using the tag probe.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems on IPv4-IPv6 network transition","authors":"Ruri Hiromi, Hideaki Yoshifuji","doi":"10.1109/SAINT-W.2006.33","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.33","url":null,"abstract":"IPv6 (Internet protocol version 6) is now available in various OSs and applications. It is also deployed in major ISP backbone networks. Although most of all IPv6 features work as they were designed, we may have potential problems with them and they might exist in IPv4-IPv6 dual stack environment. On the other hand, we don't have much opportunity to exchange enough information about dual stack network operation. We build a special research group named \"IPv6-Fix\" in WIDE Project in Japan, to investigate the potential issues related to IPv6 deployment. We concern about the problems on IPv4-IPv6 dual stack environment from various perspectives, such as specification, implementation and network operation. From our survey and analysis, we found some problems to be fixed. In this paper, we show some error cases taken by harmful specification, poor implementations and wrong operation. For the healthy coexistence of IPv4-IPv6, we share and consider how we should design and operate dual stack network","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An L3-driven fast handover mechanism in IPv6 mobility","authors":"Kazutaka Gogo, R. Shibui, F. Teraoka","doi":"10.1109/SAINT-W.2006.6","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.6","url":null,"abstract":"Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes a network layer (L3) driven fast handover mechanism by using the abstract link layer information. The L3-driven fast handover mechanism was implemented on FreeBSD. The measurement results show that the gap time of an L3 handover is only 3-4 msec in our outdoor test network consisting of eight IEEE 802.11a subnets","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA","authors":"Shweta Singh","doi":"10.1109/SAINT-W.2006.28","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.28","url":null,"abstract":"The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme which not only claims but also proves that cost involved in RFID tag collision can be reduced and also the throughput can be increased by adopting the so designed model of communication. The model is basically the combination of slotted aloha and two time scale SPSA. Finally the mathematical results have been obtained by pro grammatically simulating the above designed model","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh
{"title":"Proposal of a method for protecting private information in user context","authors":"Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh","doi":"10.1109/SAINT-W.2006.35","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.35","url":null,"abstract":"In a ubiquitous computing environment, people can obtain and transmit information anytime, anywhere. In this situation, a user's context plays a key role. Unfortunately, the ubiquitous environment introduces some problems. The first is ease of access to what users truly want. The second important problem is handling private information. In utilizing a ubiquitous environment, all of a user's context is held online, and applications may share them to propose advanced services. Therefore, a user's context is automatically transmitted or attached as metadata. The context, however, includes the user's private information. Therefore, we need a system that separates information into private and public elements and treats them differently. In view of this, we consider how to attach metadata and how to extract and protect transmitted private information, in the specific case of blog entries. We propose a method of protecting private information that expands the existing item definition format in the CaTaC platform. This method will support the establishment of new communication methods using blogs in the near future","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Product specific security features based on RFID technology","authors":"Zoltán Nochta, T. Staake, E. Fleisch","doi":"10.1109/SAINT-W.2006.34","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.34","url":null,"abstract":"In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach utilizes RFID technology: transponders hold unique and cryptographically secured data that uniquely binds a given product to a given tag, and thus makes duplication or re-application of tags difficult","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPv6 R&D activities in WIDE Project","authors":"H. Esaki, A. Kato, J. Murai","doi":"10.1109/SAINT-W.2006.26","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.26","url":null,"abstract":"The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of WIDE project has been IPv6 technology and has established IPv6 testbed since 1998. Basically, all of R&D activities in WIDE project are based on the IPv6. This paper describes the overview of WIDE project's IPv6 R&D activities, such as KAME/USAGI/TAHI/Nautikus6 projects","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}