{"title":"An Attack-Resilient Channel Assignment MAC Protocol","authors":"Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu","doi":"10.1109/NBiS.2009.42","DOIUrl":"https://doi.org/10.1109/NBiS.2009.42","url":null,"abstract":"Although multi-channel wireless protocols are becoming predominant, security mechanisms of channel assignment are far from sufficient to protect the channel usage. In this paper, we discuss radio jamming attacks, ripple effect attacks and false information injection attacks in multi-interface and multi-channel wireless networks. We propose a security mechanism to secure channel management in multi-channel wireless networks. Our channel assignment protocol is resilient to the aforementioned intrusions. The evaluation results show that our protocol is effective and efficient.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122167013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SRJE: Decentralized Authentication Scheme against Sybil Attacks","authors":"Yo Mashimo, Masanori Yasutomi, H. Shigeno","doi":"10.1109/NBiS.2009.54","DOIUrl":"https://doi.org/10.1109/NBiS.2009.54","url":null,"abstract":"In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number of malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qian You, S. Fang, S. Mukhopadhyay, Harsha Gopal Goud Vaka, J. Chen
{"title":"Visualizing a Correlative Multi-level Graph of Biology Entity Interactions","authors":"Qian You, S. Fang, S. Mukhopadhyay, Harsha Gopal Goud Vaka, J. Chen","doi":"10.1109/NBiS.2009.37","DOIUrl":"https://doi.org/10.1109/NBiS.2009.37","url":null,"abstract":"In this paper we present a new visualization paradigm to represent and assist the understanding of a correlative multi-level graph, a group of inter-connected networks. Such a graph is formed via term association mining, and the visualization paradigm consists of three components: terrain surface visualization units, terrain surface arrangement, and terrain surface correlation. We apply this paradigm to visualize and explore a pair of correlative core cancer terms network and core gene terms network. The results show that our visualization paradigm design is consistent with the derived associations, and is effective in preserving major features as the landmarks in the terrain surfaces.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Run-time Updating of Network Device Drivers","authors":"Hiroyuki Tanaka, Y. Nomura, H. Taniguchi","doi":"10.1109/NBiS.2009.53","DOIUrl":"https://doi.org/10.1109/NBiS.2009.53","url":null,"abstract":"Recent operating systems are capable of using dynamic loadable module functions to update the device driver programs without shutting down the entire system. However, even if a system continues to operate, some services provided by the device driver will be temporarily unavailable during the run-time update. To reduce the period during which the services are unavailable, we propose a new method for run-time updating of device drivers; this method uses context migration from an old driver to an updated one. In this study, we describe the implementation of a network-device driver using our method. In addition, we have shown some advantages of our method by performing a trial on the FreeBSD operating system.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tele-Immersion Environment for Video Avatar Based CVE","authors":"Tomoyuki Ishida, Keisuke Yatsu, Y. Shibata","doi":"10.1109/NBiS.2009.89","DOIUrl":"https://doi.org/10.1109/NBiS.2009.89","url":null,"abstract":"In this paper, we propose a middleware system to realize collaborative virtual environment (CVE) considering tele-immersion environment based on personal computer. Using this middleware system, more immersive and presence feeling is attained and collaborative work can be effectively improved compared with using immersive display like CAVE. We built a prototype system of the proposed method and carried out functional and performance evaluations. As a result, we could verify that our proposed system is very cost effective and provided basic CVE functions on PC environment.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LITS: Lightweight Intelligent Traffic Simulator","authors":"Thomas Winters, Matthew F. Johnson, V. Paruchuri","doi":"10.1109/NBiS.2009.76","DOIUrl":"https://doi.org/10.1109/NBiS.2009.76","url":null,"abstract":"The traffic lighting systems used to regulate today’s trafficking system, although an integral part of the system, is inefficient. This inefficiency contributes to the increased cost of transportation while also contributing to the levels of pollution emitted as a result of human transportation needs; in addition to these detriments, this inefficiency also wastes the travelers’ time. We strongly believe that Intelligent Traffic Light Control can significantly diminish waiting times before red traffic lights in a city and in the process can save our society billions of Dollars annually. To study the efficiency of current system and performance of any proposed system, there is a strong need for an accurate and lightweight simulator. While several traffic simulators have been developed under the Intelligent Transport System initiative, their primary focus has been on modeling and forecasting vehicle traffic flow and congestion from a queuing perspective. In this describe Lightweight Intelligent Traffic Simulator (LITS) being developed for studying different traffic control systems.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"243 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133228008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection of Relevant Parameters Based on Conflict","authors":"M. Benkaci, A. Doncescu, N. Kabbaj","doi":"10.1109/NBiS.2009.70","DOIUrl":"https://doi.org/10.1109/NBiS.2009.70","url":null,"abstract":"In this paper, we present a new approach for selection of relevant parameters in fault detection process. The conflict notion is used in order to evaluate the relevance of any subset of parameters. This selection is divided in two steps. The first consists in making partitioning of data running smooth. During the second step, we calculate the conflict between each subset of parameters. The experimental results are presented for several subsets of parameters for given breakdown in automobile system. In the second part of paper, we propose an automatic discretization algorithm; this algorithm improves the Hellinger-based discretization by adding an automatic stopped criterion.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Model for a System to Start Communicating with a Human Using HMM","authors":"Makoto Murakami, M. Yamagiwa, M. Uehara","doi":"10.1109/NBiS.2009.78","DOIUrl":"https://doi.org/10.1109/NBiS.2009.78","url":null,"abstract":"The purpose of this paper is to develop a robot that actively communicates with a human, and explicitly extracts information from the human mind that is rarely expressed as verbal information. The spoken dialogue system for information collection must independently decide whether it may or may not start communicating with a human. In this paper, we assume that the system begins to communicate with a human sitting and working at a desk, analyze the relationship between his behavioral pattern and the decisions made by the other humans, i.e., whether or not to communicate with the former, and construct the decision model for the system to start communicating with the human using hidden Markov model.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor Networks","authors":"H. Le, A. Scholtz, A. Potgieter","doi":"10.1109/NBiS.2009.40","DOIUrl":"https://doi.org/10.1109/NBiS.2009.40","url":null,"abstract":"Wireless Sensor Networks (WSNs) have emerged with many useful applications but require a number of conflicting desirable properties such as: scalability, self-configuration, self-organization, deployability and simplicity. Most existing WSN proposals meet one or more of these requirements, but not all of them. Besides prior to the deployed of a network, it is challenging to alter the underlying technologies, such as: localization, routing, etc. This paper attempts to solve the complexity of these systems by proposing a dynamic structured framework using agents to facilitate different demands of WSN applications. For proof-of-concept, an initial prototype system was developed on the Solarium SunSPOT emulator.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Micro Virtual Disks for Constructing Large-scale Storage","authors":"M. Uehara","doi":"10.1109/NBiS.2009.24","DOIUrl":"https://doi.org/10.1109/NBiS.2009.24","url":null,"abstract":"Recently the demand for low cost, large-scale storage has risen. We developed the VLSD (Virtual Large Scale Disk) toolkit for constructing virtual disk based distributed storage, by aggregating the free space of individual disks. However, the single file server in the prototype system becomes a bottleneck and is the only point of failure. Thus, to improve reliability and performance, we propose the MMVD (Multiple Micro Virtual Disks) method, in which large-scale storage consists of many small file servers. With MMVD, there is neither a single point of failure, nor a bottleneck because multiple file servers manage many small disks. In addition, a MMVD system offers increased reliability because it reduces the MTTR.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125605796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}