{"title":"An Indirect Proactive Handoff Scheme Using Location Information","authors":"M. Mansour, A. Almazyad","doi":"10.1109/NBiS.2009.87","DOIUrl":"https://doi.org/10.1109/NBiS.2009.87","url":null,"abstract":"In this paper, we present a new approach to provide fast handoff in Mobile IP. A new Indirect Proactive handoff scheme using Location Information (IPH) protocol is proposed to allow the network to achieve accurate handoff decisions. Every foreign agent will contain the location of their foreign agent’s neighbors, and can detect the movement and the direction of the mobile host. The mobile host periodically informs its serving foreign agent of its location. The current foreign agent can know the distance between foreign agent and mobile host. Handoff latency is minimized by initiating data forwarding to the new foreign agent at the time that the mobile host becomes close to the threshold value based on the coverage area of the foreign agent. Simulations results show that our scheme is more efficient, in terms of packet loss, than the other most famous micro-mobility protocols such as: Hierarchical MIP (HMIP).","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Middleware Architecture for Web Information Reuse","authors":"N. Mohamed, J. Al-Jaroodi","doi":"10.1109/NBiS.2009.67","DOIUrl":"https://doi.org/10.1109/NBiS.2009.67","url":null,"abstract":"This paper introduces the concept of middleware for retrieving web information. The Internet provides huge online and updated information related to different aspects of businesses and environments such as stock prices, currency exchange rates, interest rates, and weather information. All this information can be reused for new applications through the proposed middleware. The paper discusses the Internet information reuse challenges, the proposed middleware architecture, and the middleware services that can be supported. This type of middleware can be used by a number of applications that need some information from the Internet. Examples of these applications are stock investment tools, notification systems, weather monitoring, and many more.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Framework for Modelling Service Value Creation Networks","authors":"T. Dinh, M. Léonard","doi":"10.1109/NBiS.2009.98","DOIUrl":"https://doi.org/10.1109/NBiS.2009.98","url":null,"abstract":"Nowadays, services have become the major growth-driver of many economies. In fact, about 75% of GDP of developed countries comes from the service sector so that the global economy is dominated by this sector. A thorough understanding as well as innovative approaches, such as new methods, models and frameworks for a network of services systems is needed in order to succeed in the global economy. For this reason, this paper focuses on a conceptual framework for modelling service value creation networks. Firstly, it introduces the necessity for the conceptual framework. Secondly, it continues with literature review of service economy, service science, service systems and services. Thirdly, it presents the approach for modelling service value creation networks, which are defined as networks of service systems. Fourthly, the conceptual framework is proposed, including three levels: Service system level, Service value chain level, and Service value creation network level. Fifthly, an example about an offshore call centre as a service value creation network is illustrated. Finally, the paper ends with a conclusion, future directions and perspectives.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reasonable Security by Effective Risk Management Practices: From Theory to Practice","authors":"S. Ghernaouti-Helie, David Simms, I. Tashi","doi":"10.1109/NBiS.2009.66","DOIUrl":"https://doi.org/10.1109/NBiS.2009.66","url":null,"abstract":"In this period of grave uncertainty, organizations have to manage more and more complicated situations in an environment that is subject to massive and rapid evolution. A solely intuitive approach to risk management is no longer sufficient when considering the need to optimize investments concerning security. It is necessary to find the difficult balance between the cost of risks versus their reduction so as to ensure that organizations can realize their objectives in a reasonable and durable manner. The aim of this paper is to point out the strong need for information system’s owners and manager to rely upon effective risk analysis methodology for decision making related to efficient security measure in order to develop business performances. We present a methodological approach. A case study and return of experiences “ based on real life” are given to illustrate the applicability of it.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122612601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Goshi Sato, Noriki Uchida, Daisuke Asahizawa, Y. Shibata
{"title":"Power Saving Cognitive Radio LANs for Disaster Information","authors":"Goshi Sato, Noriki Uchida, Daisuke Asahizawa, Y. Shibata","doi":"10.1109/NBiS.2009.88","DOIUrl":"https://doi.org/10.1109/NBiS.2009.88","url":null,"abstract":"Wireless LANs are very useful as disaster information networks because of their mobility, portability and easy installation. However, in the actual disaster case, electric power line is also damaged and those wireless LANs cannot be functioned. In this paper, we introduce a power saving cognitive wireless LANs for disaster use with combination of solar panel, wind turbine and battery, so that, the autonomous wireless network can be established and provide normal network functionality even through the other wired electric power and network are seriously damaged. Furthermore, by combining with multiple LANs with different transmission characteristics and selectively switching those, suitable communication environment can be provided even though the communication environment has been changed. Using combination of fixed and mobile cognitive networks, a large disaster communication network is organized. In this paper, we designed a wireless mobile network with currently available different wireless LANs and constructed a prototype system to evaluate the functional and performance.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison","authors":"Ambarish Karole, Nitesh Saxena","doi":"10.1109/NBiS.2009.57","DOIUrl":"https://doi.org/10.1109/NBiS.2009.57","url":null,"abstract":"The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or Wi-Fi, is known as \"pairing.\" The devices being paired are ad hoc in nature, i.e., they can not be assumed to have a prior context (such as pre-shared secrets) or a common trusted on- or off-line authority. However, the devices can generally be connected using auxiliary physical channel(s) (such as audio or visual) that can be authenticated by the user(s) of the devices. These authenticatable channels can thus be used to form a basis for pairing. One of the simplest pairing methods requires user to compare short (typically 4 digit long) numbers displayed on two devices. Prior usability studies investigating the numeric comparison method indicate that although users hardly ever reject matching numbers on two devices, a critical task of detecting non-matching numbers (and thus potential man-in-the-middle attacks) can be error-prone. In this paper, we propose a very simple and an intuitive method of employing \"hyphen-delimited\" numbers in device pairing. Our usability studies and analysis of test results show that the proposed method improves the robustness as well as usability of pairing based on numeric comparison.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116496045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaipal Singh, P. Veeraraghavan, Samar Singh, V. Potdar
{"title":"Real-Time Public Group Collaboration using IP Multicast Label Filters","authors":"Jaipal Singh, P. Veeraraghavan, Samar Singh, V. Potdar","doi":"10.1109/NBiS.2009.28","DOIUrl":"https://doi.org/10.1109/NBiS.2009.28","url":null,"abstract":"Internet based enterprise level collaboration tools enable organizations to make decisions faster and more accurately with less effort. However, these tools provide limited real-time group collaboration within and across organizations. Multicast protocols were developed to provide efficient group communication. This paper proposes a novel IP multicast network layer filter architecture that provides efficient and scalable real-time group collaboration between the required entities within an organization. This proposed network architecture uses a label filter mechanism to improve scalability and bandwidth for one-to-many and many-to-many real-time collaboration.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121991134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks","authors":"Aasma Abid, Mukhtar Hussain, F. Kausar","doi":"10.1109/NBiS.2009.18","DOIUrl":"https://doi.org/10.1109/NBiS.2009.18","url":null,"abstract":"Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing. Base station generates inter-cluster routes and cluster head generates intra-cluster routes. This minimizes the computation load on cluster nodes. We also provide light-weight broadcast authentication used for secure routing table generation and data communication; and to reduce communication overhead. Further, proposed scheme introduces security architecture with in routing protocol. The analysis of proposed scheme shows that it is secure against routing attacks and tolerant to compromised nodes.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HAP - A Heterogeneous Ad hoc Protocol","authors":"A. Doci, L. Barolli, F. Xhafa","doi":"10.1109/NBIS.2009.91","DOIUrl":"https://doi.org/10.1109/NBIS.2009.91","url":null,"abstract":"Ad hoc wireless networks are becoming an important infrastructure for developing networking applications due to their decentralized nature, improved scalability as compared to wireless managed networks, minimal configuration and fast deployment. However, such networks show several limitations regarding their capacity and are, in general, impractical for stand alone commercial applications; in fact, such networks are mostly used for emergency applications. However, the features of ad hoc networks can be useful to extend the connectivity of wireless networks, while taking into account node mobility. In this paper we propose a Heterogeneous Ad hoc Protocol (HAP), which aims to extend the connectivity of a wireless networks. HAP is a cross layer protocol that operates on the link, MAC, and network layers, which takes into account the impact of the mobility on each of these layers. The objective of HAP is thus to overcome limitations of existing protocols, especially regarding mobility. HAP can be useful for developing applications in pedestrian and community networks.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks","authors":"Sudath Indrasinghe, R. Pereira, J. Haggerty","doi":"10.1109/NBiS.2009.41","DOIUrl":"https://doi.org/10.1109/NBiS.2009.41","url":null,"abstract":"MANETs are self-organizing networks formed on-the-fly by a group of wireless hosts in an environment without infrastructure. Host mobility and lack of central administration in MANETs require dynamic and distributed network operations. Many schemes have been proposed for address configuration and management within this type of network but these are not without their problems. This paper presents distributed algorithms for new host configuration and MANETs merging. The proposed conflict-free address auto-configuration scheme facilitates an effective and efficient solution. Simulation results demonstrate the applicability of the proposed approach in acquiring a new address, message usage for address assignation and MANETs merging. In addition, the simulation demonstrates that the proposed address reclamation mechanisms are simple, efficient and reliable.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}