A. Berthe, A. Lecointre, D. Dragomirescu, R. Plana
{"title":"Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band","authors":"A. Berthe, A. Lecointre, D. Dragomirescu, R. Plana","doi":"10.1109/ICN.2009.48","DOIUrl":"https://doi.org/10.1109/ICN.2009.48","url":null,"abstract":"Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a complete WSN simulation architecture, with the IR-UWB specificities at the PHYsical (PHY) and the Medium Access Control(MAC) layers. In this paper, we propose a WSN simulation architecture based on the IR-UWB technique. At the PHY layer, we take into account the pulse collision by dealing with the pulse propagation delay. We also modelled MAC protocols specific to IRUWB,for WSN applications. To completely fit the WSN simulation requirements, we propose a generic and reusable sensor and sensing channel model. Most of the WSN application performances can be evaluated thanks to the proposed simulation architecture. The proposed models are implemented on a scalable and well known network simulator: Global Mobile Information System Simulator (GloMoSim). However,they can be reused for all other packet based simulation platforms.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116306153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Turner, Koon Leai Larry Tan, J. Blum, Guy C. Warner, Simon B. Jones, P. Lambert
{"title":"Managing Data in E-Social Science","authors":"K. Turner, Koon Leai Larry Tan, J. Blum, Guy C. Warner, Simon B. Jones, P. Lambert","doi":"10.1109/ICN.2009.15","DOIUrl":"https://doi.org/10.1109/ICN.2009.15","url":null,"abstract":"Grid computing is moving from its original focus on the physical sciences to other disciplines such as the social sciences. The orientation of these newer applications is on data management rather than processing. This paper describes how the DAMES project (Data Management through E-Social Science) is developing grid-based solutions for handling data in a distributed environment. The paper describes the approach being taken to meet key challenges: metadata for effective use of datasets, and data-oriented workflows for e-social science.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project","authors":"Lothar Fritsch, Arne-Kristian Groven, Lars Strand","doi":"10.1109/ICN.2009.57","DOIUrl":"https://doi.org/10.1109/ICN.2009.57","url":null,"abstract":"This paper describes the approach and preliminary results from the research project EUX2010sec. The project works closely with Voice-over-IP (VoIP) companies and users. It aims at providing better security of open source VoIP installations. The work towards this goal is organized by gathering researchers and practitioners around several scientific activities that range from security modeling and verification up to testbed testing. The expected outcomes of the project are a solid scientific and practical understanding of the security options for setting up VoIP infrastructures, particular guidance on secure, typical setups of such infrastructures, The project’s special focus is on producing results relevant to the practitioners in the project, aiming at the stimulation of innovation and the provision of highest quality in open-source based VoIP products and services.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eric Douglas Teixeira, Carlos Becker Westphall, C. Westphall
{"title":"Self-Configuration Channel in the Wireless Networks","authors":"Eric Douglas Teixeira, Carlos Becker Westphall, C. Westphall","doi":"10.1109/ICN.2009.66","DOIUrl":"https://doi.org/10.1109/ICN.2009.66","url":null,"abstract":"This paper describes the importance of choosing channels in the Wireless Local Networks (WLAN) performance. The massive use of channel 6, the default channel in most 802.11 networks, usually impacts at least, 100% in the throughput of the network In some cases, considering the number of 802.11 networks around and the time, the impact can be as high as 1200%. The protocols implemented in the 802.11b/g/n networks use Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), a multiplexing structure between users. This paper proposes a new structure of multiplexing between users and access points to improve the performance of these networks.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dawid Ohia, I. Pozniak-Koszalka, L. Koszalka, A. Kasprzak
{"title":"Efficiency Analysis of Evolutionary Algorithm for Congestion Problem Using Computer Experimentation System","authors":"Dawid Ohia, I. Pozniak-Koszalka, L. Koszalka, A. Kasprzak","doi":"10.1109/ICN.2009.18","DOIUrl":"https://doi.org/10.1109/ICN.2009.18","url":null,"abstract":"This paper presents a proposed highly configurable evolutionary algorithm together with a computer experimentation system supporting its efficiency analysis. An important issue in the network survivability area dealing with the congestion problem in connection-oriented networks is the optimization task. The presented system enables planning and performing complex experiments with the proposed evolutionary algorithms. Particular emphasis was placed on parameter control and tuning process of evolutionary algorithm. Description of performed experiments and computational results are reported as well as plans for further research.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122115398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metric-Based Topology Investigation","authors":"F. Bohdanowicz, Harald Dickel, Christoph Steigner","doi":"10.1109/ICN.2009.19","DOIUrl":"https://doi.org/10.1109/ICN.2009.19","url":null,"abstract":"We introduce our new Routing with Metric-based Topology Investigation (RMTI) protocol, which is compatible withall RIP protocols and, in contrast to RIP, is able to detectrouting loops simply by carefully examining incoming routing updates. We do not just reject old routing information as soon as new and seemingly better routing information occurs at the same router. With this improvement we have developed a new Distance Vector algorithm which outperforms all other Distance Vector algorithms.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of the Pseudo-VRRP Based High Availability Mechanism in the ForCES Router","authors":"Xiaochun Wu, Ligang Dong","doi":"10.1109/ICN.2009.49","DOIUrl":"https://doi.org/10.1109/ICN.2009.49","url":null,"abstract":"ForCES (Forwarding and Control Element Separation) architecture brought forward by IETF shows great advantages for network devices such as routers, wireless base stations, etc to be flexible, programmable, and cost-effective.This paper put forward a new high availability scheme for ForCES router. The framework of ForCES devices is firstly introduced. Then based on a revised VRRP protocol, a primary CE election mechanism is proposed and the kinds of ForCES information to be backuped are thoroughly analyzed. Next, system implementation issues are considered. Finally, a ForCES high availability router testbed is constructed, experiment results on it verifies the correctness, feasibility and efficiency of the proposed high availability scheme.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Patsakis, Alexandros Asthenidis, Abraham Chatzidimitriou
{"title":"Social Networks as an Attack Platform: Facebook Case Study","authors":"C. Patsakis, Alexandros Asthenidis, Abraham Chatzidimitriou","doi":"10.1109/ICN.2009.77","DOIUrl":"https://doi.org/10.1109/ICN.2009.77","url":null,"abstract":"In this paper it is described how can a social network, like Facebook, be exploited and converted into an attack platform, in order to gain some sensitive data, which can complete a perfect attacking profile against a user. More specifically, we created a Facebook application for demonstration purposes that on the surface is a simple application, but on the background it collects useful data, making it easy to attack against the user with malicious programs, showing the risks that these platforms can expose their users to.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Turner, Liam S. Docherty, Feng Wang, G. Campbell
{"title":"Managing Home Care Networks","authors":"K. Turner, Liam S. Docherty, Feng Wang, G. Campbell","doi":"10.1109/ICN.2009.16","DOIUrl":"https://doi.org/10.1109/ICN.2009.16","url":null,"abstract":"Home care networks are a new development for automated support of care at home. To address the challenges of home care, the paper describes a component-based architecture developed by the MATCH project (Mobilising Advanced Technologies for Care at Home). Two key components are discussed for managing home care networks. A Service Registry supports generic and extensible registration of services, components, resources and devices in the home. The registry uses ontologies for semantically-based description and discovery. A Policy System automates support of how a home network should deliver care. The views of stakeholders in home care are represented as goals and policies. These are defined in a user-friendly manner and are applied at run-time. Conflicts among goals and policies are automatically detected and resolved.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Menna, Tiziana Refice, L. Cittadini, G. Battista
{"title":"Measuring Route Diversity in the Internet from Remote Vantage Points","authors":"A. Menna, Tiziana Refice, L. Cittadini, G. Battista","doi":"10.1109/ICN.2009.34","DOIUrl":"https://doi.org/10.1109/ICN.2009.34","url":null,"abstract":"Recent works on modeling the Internet topology [8, 9]have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimpli¿ed without sacri¿cing accuracy in capturing route selection. Such a shortcoming can mislead the understanding,hence the prediction, of the BGP (Border Gateway Protocol) behavior. In particular, models that assume an AS to be an atomic entity fail to account for route diversity, informally de¿ned as the selection within a single AS of multiple routes to the same destination pre¿x. Internet topology models are usually built out of BGP data collected by remote vantage points. Thus, in this paper we aim at extracting and characterizing the route diversity that can be measured using such dataset.Towards this goal, we devise a methodology to compute route diversity from a continuous stream of collected BGP messages. The analysis of our results shows that (i) accounting for the BGP dynamics allows to extract much more diversity than from a static snapshot of the Internet routing con¿guration; (ii) route diversity observed for an AS is strongly related to its location in the customer-provider hierarchy; (iii) the distribution of route diversity over ASes is unlikely to be biased by the specific choice of the collection system, while the number of pre¿xes exhibiting route diversity can depend on both number and location of the vantage points.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}