{"title":"Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol","authors":"Zeeshan Bilal, A. Masood, F. Kausar","doi":"10.1109/NBiS.2009.9","DOIUrl":"https://doi.org/10.1109/NBiS.2009.9","url":null,"abstract":"Gossamer protocol has been recently published to achieve mutual authentication in low-cost RFID tags. This protocol is considered to fall in ultra-lightweight class as it incorporates simple and low cost operations. Most of the earlier proposals in this class were exposed soon after their publication. Common weaknesses included use of Triangular functions and improper use of logic operators. Gossamer protocol used two non-triangular functions a) ROTbits and b) MIXbits. These functions provide confusion and diffusion properties and are implemented as cheaper operations. Thus, this protocol can be used for EPCglobal Class-1 Generation-2 standard (considered as universal standard for low-cost tags). This protocol is able to overcome existing weaknesses and is considered to be more attractive for low-capability devices as compared to earlier protocols of this class. In this paper, we analyze the security features provided by Gossamer protocol. The vulnerabilities discovered during this analysis reveal that different attacks including denial of service, memory and computation exhaustive, de-synchronization, replay, attack on data integrity and IDS (index pseudonym) collision are possible. As a consequence, we propose a new mutual authentication protocol keeping in mind the constraints and making use of the existing operations without addition of any expensive one. The analysis of the proposed protocol shows that it is resistant to all the attacks possible in case of Gossamer protocol. A comparative security analysis shows that proposed protocol provides better security features with a small compromise of communication overheads. Two additional public messages are exchanged between the reader and the tag to address the vulnerabilities present in Gossamer protocol.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"65 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Selective Update Propagation Based on Degree of Data Update in Peer-to-Peer Networks","authors":"Toshiki Watanabe, A. Kanzaki, T. Hara, S. Nishio","doi":"10.1109/NBiS.2009.44","DOIUrl":"https://doi.org/10.1109/NBiS.2009.44","url":null,"abstract":"In a P2P network, it is common that data items are replicated on multiple peers for improving data availability. In such an environment, when a data item is updated on a particular peer, the update should be immediately propagated to other peers holding its replicas. However, in some applications, some replica holders do not need the update when the degree of change in the update is small. In this paper, we propose two update propagation strategies considering the degree of change in data update in P2P networks. Our proposed strategies reduce the load for propagating data update by suppressing the update propagation to replica holders which do not need to receive the update. Moreover, we verify the effectiveness of our strategies by simulation experiments.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Gui, M. Guillen, N. Rishe, A. Barreto, J. Andrian, M. Adjouadi
{"title":"A Client-Server Architecture for Context-Aware Search Application","authors":"Feng Gui, M. Guillen, N. Rishe, A. Barreto, J. Andrian, M. Adjouadi","doi":"10.1109/NBiS.2009.75","DOIUrl":"https://doi.org/10.1109/NBiS.2009.75","url":null,"abstract":"This paper develops a client-side context-aware search application which is built on the context-aware infrastructure. A context-aware architecture is designed to collect the mobile user’s context information, derive mobile user’s current context, distribute user context among context-aware applications, and support the context-aware applications. The context acquisition is centralized at the context server to ensure the reusability of context information among mobile devices, while context reasoning remains at the application level. Algorithms are proposed to consider the user context profiles. By promoting feedback on the dynamics of the system, prior user selection is now saved for further analysis expediting a subsequent search. A software-based proxy is set up at the client side which includes the context reasoning component. Implementation of such a proxy supports that the context applications are able to derive the user context profiles. To meet the practical demands required of a testing environment, a software simulation using Yahoo search API is provided as a means to evaluate the effectiveness of the design approach in a realistic way. The integration of user context into Yahoo search engines proves how context-aware searches can meet user demands for tailored services and products in and around the user’s environment.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weigao Xie, Balaji Polepalli, M. Goyal, S. Hosseini
{"title":"Enhancing Simulation Mode Operation of ospfd","authors":"Weigao Xie, Balaji Polepalli, M. Goyal, S. Hosseini","doi":"10.1109/NBiS.2009.72","DOIUrl":"https://doi.org/10.1109/NBiS.2009.72","url":null,"abstract":"In this paper, we describe our modifications to ospfd, a popular open-source implementation of OSPF routing protocol. The ospfd software can also be run in simulation mode, where processes, representing individual routers, communicate with each other over UDP sockets. Even though ospfd provides a fine-granularity implementation of OSPF protocol, its simulation mode operation leaves a lot to be desired. The main weakness of ospfd’s simulation mode operation is its lack of distinction between the real time and simulated time. The simulated time is represented in terms of ticks and increases at the same rate as the real time, i.e. the duration of an individual tick is fixed (e.g. 50ms). Consequently, the amount of work done by a router process in a given tick depends on how long this process has access to CPU during this tick. In our modifications, we introduced separation between the real time and simulated time by assigning specific (simulated) time durations with individual protocol tasks such as routing calculations and processing of OSPF packets (Hello, LSUpdate etc.). In modified ospfd, a tick gets over only when all router processes have completed the work they are supposed to do during the current tick. Additionally, we introduced several other modifications such as event based advancement of simulated time, script-based specification of topology change events and allowing router processes to run on multiple machines.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Internet Mobility","authors":"Ping Zhang, A. Durresi, L. Barolli","doi":"10.1109/NBiS.2009.94","DOIUrl":"https://doi.org/10.1109/NBiS.2009.94","url":null,"abstract":"Mobility support has been on the list of most expected features of future Internet for a long period. Both Internet users and content providers look forward to the deployment of Internet mobility support, but none of proposed solutions has been adopted in large scale due to various impediments. In order to assist future researches on this urgent topic, we discuss the origin and fundamental requirement of Internet mobility issues and review several methods for mobility support. A few impediments overlooked by existing solutions are discussed as well. Finally, several state-of-the-art researches and solutions are reviewed, appended with brief analysis of cellular data network.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol","authors":"T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2009.58","DOIUrl":"https://doi.org/10.1109/NBiS.2009.58","url":null,"abstract":"Information systems are required to be not only secure but also consistent in presence of security threats and multiple conflicting transactions. There are many discussions on each of the security and concurrency control. In this paper, we discuss a novel synchronization protocol to make an information system secure and consistent. In the role-based access control model, authorized access requests are specified in roles. A transaction issued by a subject is assigned with a subfamily of roles named purpose. Based on the purpose concept, we discuss how to prevent illegal information flow to occur by performing conflicting transactions.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applied System of the Social Life Log for Ecological Lifestyle in the Home","authors":"M. Yamagiwa, M. Uehara, Makoto Murakami","doi":"10.1109/NBiS.2009.74","DOIUrl":"https://doi.org/10.1109/NBiS.2009.74","url":null,"abstract":"A lot of trials to reduce carbon dioxide emissions are performed as global warming countermeasures. We use sensors and record environment in the indoor and electric power consumption in the indoor. In a house, the sensors measure the temperature, humidity, intensity of illumination. The measured elements are related to human action and living environment closely. And we build the social life log to practice a new ecological lifestyle in the home. The social life log gives a versatile viewpoint about one action record by connecting the life logs that are personal activity records. This paper suggests a system to carry out a new ecological lifestyle to attach great importance to human comfort, and describes sensing devices and social life log to realize a system.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129898187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timeliness and QoS Aware Packet Scheduling for Next Generation Networks","authors":"Y. Lien, Yung-Chuan Wun","doi":"10.1109/NBiS.2009.64","DOIUrl":"https://doi.org/10.1109/NBiS.2009.64","url":null,"abstract":"Running time sensitive multimedia services such as Voice-over-IP (VoIP) and Video-on-Demand (VoD) on All-IP Networks may have lower quality, i.e. Quality of Service (QoS), than its counterpart on conventional circuit-switched networks. We could enhance overall QoS without investing more resources if routers could forward packets based on their timeliness and QoS class giving important late packets proper precedence. This paper proposes a charge-based optimization model for packet scheduling aiming to maximize overall QoS satisfaction factor. We also developed a simple and effective scheduling policy based on this concept for the environments where each packet has a predefined hop-by-hop traveling schedule. Routers are assumed in three different queue architectures: ideal single preemptive queue and practical multiple FIFO queue with and without a priority queue. To forward a packet, a router first assigns an adequate profit function to the packet based on its timeliness and QoS class as well as the loading status of the succeeding routers along its traveling path, and then inserts the packet into an appropriate position in the output queues. The performance of this approach is evaluated by simulation using NS-2 network simulator. Simulation results show that, under heavy load, our approach can outperform easily the Simulated Priority Queue that differentiates QoS class only.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129880895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Event Coverage in Sparse Mobile Sensor Networks","authors":"Mark E. Snyder, S. Chellappan","doi":"10.1109/NBiS.2009.71","DOIUrl":"https://doi.org/10.1109/NBiS.2009.71","url":null,"abstract":"Autonomous mobile sensors are employed with ever-increasing frequency, in applications ranging from search and rescue, detection of forest fires, and battlefield surveillance. In this paper, we consider a representative surveillance problem wherein a sparse number of mobile sensors are expected to cover events of interest in a deployment field. Each event appears for a certain time and then disappears. Furthermore, the location of each event and its duration is unknown. In this paper, we design a sensor movement strategy based on efficient traversal in the network to fulfill two objectives: maximizing event detection, and minimizing detection delay. Analysis and simulations demonstrate the performance of our algorithm from the perspective of event detection and delay with respect to the number of sensors, movement velocity, and the number and duration of events.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in the Development of Mobile Applications in Industrial Field Service","authors":"M. Aleksy, Bernd Stieger","doi":"10.1109/NBiS.2009.51","DOIUrl":"https://doi.org/10.1109/NBiS.2009.51","url":null,"abstract":"Utilizing mobile applications in the area of industrial field service promises several benefits, especially improved process support providing tailored service information and presenting it in an ad-hoc manner. The suggested approaches up to now are more or less beneficial or can’t be applied in this area at all due to some assumptions that can’t be perpetuated in most cases. In this paper, we describe the results of our evaluation of current approaches in the development of mobile applications. We discuss inhowfar these approaches can be used in industrial field service arguing their pros and cons. Based on the results of our case studies, we give some advices regarding which of the presented approaches are less suitable for industrial domains and which should be considered for further investigation.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}