{"title":"Applying the Service-Oriented Architecture for Network Discovery and Selection in the Next Generation Wireless Mobile Networks","authors":"Q. Duan","doi":"10.1109/NBiS.2009.19","DOIUrl":"https://doi.org/10.1109/NBiS.2009.19","url":null,"abstract":"The next generation wireless mobile network will be a heterogeneous networking environment consisting of various networks with heterogeneous implementations. Discovering and selecting the optimal networks for delivering an end-to-end networking service has significant impact on the service quality offered to applications. One of the main challenges to network discovery and selection is the heterogeneity of the coexisting networks in such networking environments. A key to solving this problem lies in flexible and effective interactions among the heterogeneous networks, the network control plane, and various user equipments. The Service-Oriented Architecture (SOA) is gaining high attention and acceptance in IT industry due to its power for coordinating heterogeneous systems for supporting various application requirements. The SOA offers a promising solution to network discovery and selection. In this paper, we investigate applying the SOA principles in wireless networking environments and propose a service-oriented architecture for network discovery and selection. The developed architecture and technologies are network-independent; thus are applicable to various network systems in heterogeneous wireless mobile networking environments.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124722640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eui-Jik Kim, J. In, Taeshik Shon, Yongsuk Park, B. Jun
{"title":"Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks","authors":"Eui-Jik Kim, J. In, Taeshik Shon, Yongsuk Park, B. Jun","doi":"10.1109/NBiS.2009.45","DOIUrl":"https://doi.org/10.1109/NBiS.2009.45","url":null,"abstract":"Many applications in wireless sensor network (WSNs) require energy efficiency. In addition, recently increasing applications sometimes include very sensitive information such as personal related information, and individual health data. However, existing works have not satisfied these requirements of WSN applications. In this paper, we propose an energy-efficient and secure framework for WSNs, which is CSMA and TDMA hybrid approach and provides the multi-channel TDMA based active/sleep scheduling with it. It also includes the security related functionalities to employ a flexible security suite to packets dynamically. We describe the design and implementation of this framework and show the effectiveness of our system by experiments.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122934975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Arnedo-Moreno, Keita Matsuo, L. Barolli, F. Xhafa
{"title":"A Security Framework for JXTA-Overlay","authors":"J. Arnedo-Moreno, Keita Matsuo, L. Barolli, F. Xhafa","doi":"10.1109/NBIS.2009.6","DOIUrl":"https://doi.org/10.1109/NBIS.2009.6","url":null,"abstract":"At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it is important to provide security mechanisms to P2P systems. The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. However, since its design focused on issues such as scalability or overall performance, it did not take security into account. This work proposes a security framework specifically suited to JXTA-Overlay's idiosyncrasies.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Complexity of Context in Mobile Information Systems","authors":"P. Moore","doi":"10.1109/NBiS.2009.10","DOIUrl":"https://doi.org/10.1109/NBiS.2009.10","url":null,"abstract":"This paper considers the complexity of context in mobile Information systems. Personalization is considered with context, context-awareness, mobile systems, and related research including adaptation. The principal design issues are introduced with consideration of proposed solutions and open research questions. This paper posits that the current predominance of location-based context-aware applications and systems fails to leverage the inherent richness and complexity of available contextual information and intelligent context-aware systems are required to effectively realize personalized service provision in mobile information systems.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"633 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gjergji Mino, L. Barolli, A. Durresi, F. Xhafa, A. Koyama
{"title":"A Comparison Study of Two Fuzzy-Based Handover Systems for Avoiding Ping-Pong Effect in Wireless Cellular Networks","authors":"Gjergji Mino, L. Barolli, A. Durresi, F. Xhafa, A. Koyama","doi":"10.1109/NBIS.2009.34","DOIUrl":"https://doi.org/10.1109/NBIS.2009.34","url":null,"abstract":"Wireless mobile networks and devices are becoming increasingly popular to provide users the access anytime and anywhere. The mobile systems are based on cellular approach and the area is covered by cells that overlap each other. Many handover algorithms are proposed in the literature. However, to make a better handover and keep the QoS in wireless networks is very difficult task. For this reason, new intelligent algorithms should be implemented to deal with this problem. In this paper, we carried out a comparison study of two handover systems based on fuzzy logic. We implement two Fuzzy-Based Handover Systems (FBHS). We call them FBHS1 and FBHS2. The performance evaluation via simulations shows that FBHS2 has better behavior than FBHS2 and can avoid ping-pong effect in all simulation cases.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123765458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasunori Shiono, T. Goto, T. Nishino, Chieko Kato, K. Tsuchida
{"title":"Development of Web Counseling System","authors":"Yasunori Shiono, T. Goto, T. Nishino, Chieko Kato, K. Tsuchida","doi":"10.1109/NBiS.2009.68","DOIUrl":"https://doi.org/10.1109/NBiS.2009.68","url":null,"abstract":"Some areas in Asian have no medical facilities and proper mental health care is unavailable. Therefore, online counseling systems are needed. We have been studying and putting into practice online counseling for people assigned overseas. We constructed a system using agile software development for those assigned overseas in Asia. The first step involved developing a prototype system based on system requirements after we repeatedly discussed system development with people in charge of a clinic. Next, we conducted interviews about the online counseling system. We also discussed and analyzed the interviews. Finally, we completed the online Web counseling system by repeatedly discussing possible improvements with the clinic and then incorporating the changes in the system. We report on the construction of the system.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Mapp, F. Shaikh, Mahdi Aiash, R. M. Vanni, M. Augusto, E. Moreira
{"title":"Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks","authors":"G. Mapp, F. Shaikh, Mahdi Aiash, R. M. Vanni, M. Augusto, E. Moreira","doi":"10.1109/NBiS.2009.95","DOIUrl":"https://doi.org/10.1109/NBiS.2009.95","url":null,"abstract":"The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-ofservice, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical handover. Y-Comm is a new architecture that will meet the challenge of this new environment. This paper explores the design of efficient imperative handover mechanisms using the Y-Comm Framework. It first looks at different types of handovers, then examines the Y-Comm Framework and shows how Y-Comm maps unto current mobile infrastructure. It then explores support for different handover mechanisms using Y-Comm. Finally, it highlights the development of a new testbed to further investigate the proposed mechanisms.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131401329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huy Hoang Ngo, Yiling Wang, P. D. Le, B. Srinivasan, Vishv M. Malhotra
{"title":"A Membership-Oriented Group Key Management for Application Services","authors":"Huy Hoang Ngo, Yiling Wang, P. D. Le, B. Srinivasan, Vishv M. Malhotra","doi":"10.1109/NBiS.2009.43","DOIUrl":"https://doi.org/10.1109/NBiS.2009.43","url":null,"abstract":"Group key management is an important framework to secure group communications. To improve the performance of re-keying for group key management in large scale systems, logical hierarchical key was proposed. However, this approach does not consider the high re-keying cost of single user having multiple memberships. In this paper, we propose a membership oriented group key structure to optimize the re-keying of multiple membership users. Users in the systems are grouped into key-groups based on their memberships. Therefore, the re-keying operations for members of these groups can be combined without sacrificing forward secrecy. An analysis shows that the cost of re-keying operations in large scale multiple membership group key management can be improved with the proposed group key management.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy Inference Model for Risk based Informed Decision-Making in e-Business","authors":"O. Hussain, T. Dillon, E. Chang, F. Hussain","doi":"10.1109/NBiS.2009.85","DOIUrl":"https://doi.org/10.1109/NBiS.2009.85","url":null,"abstract":"Since its invention, the web has considerably advanced and it now provides its users with sophisticated technologies and processes for facilitating interactions. This has enabled users to complete their tasks by efficient ways and in turn increase their productivity. But in such an environment, it is imperative for a user to make informed decisions in a proactive way by which it can achieve its aims and maximize its interaction experience. To achieve that, various approaches have been proposed by which a user can make an interaction-based decision in web-based ecommerce. But at the same time the notion of risk has been considerably ignored in that domain; even though it has been mentioned in the literature that risk plays an important part while decision-making in any domain. So in order to have such an analysis of risk while decision-making, in this paper we highlight the importance of risk and then propose a fuzzy inference model for assisting risk-based decision making in e-commerce business interactions.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133011734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balls Hierarchy: A Proximity Query for Metric Spaces and Covering Theorem","authors":"S. Kockara","doi":"10.1109/NBiS.2009.100","DOIUrl":"https://doi.org/10.1109/NBiS.2009.100","url":null,"abstract":"In recent years, considerable advances have been made in the field of storing and processing moving data points. Data structures that discretely update moving objects or points are called Kinetic Data Structures. A particular type of data structure that constructs geometric spanner for moving point sets is called Deformable Spanner. This paper explores the underlying philosophy of deformable spanner and describes its rudiments. Deformable Spanners create a multi-resolution hierarchical subgraph that reflects a great deal about the original graph while maintaining all the existing proximity information in the graph. This proximity information plays a crucial role in wide variety of application areas, such as fast similarity queries in metric spaces, clustering in both dynamic and static multidimensional data, and cartographic representation of the complex networks. The motivation behind our work is twofold: first, to provide comprehensive understanding of the deformable spanner with sample illustrations without sacrificing depth of coverage; second, to analyze and improve deformable spanner’s covering property for 2D case in Euclidean space.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}