21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)最新文献

筛选
英文 中文
An Efficient Scheme for User Authentication in Wireless Sensor Networks 一种有效的无线传感器网络用户认证方案
Canming Jiang, Bao Li, Haixia Xu
{"title":"An Efficient Scheme for User Authentication in Wireless Sensor Networks","authors":"Canming Jiang, Bao Li, Haixia Xu","doi":"10.1109/AINAW.2007.80","DOIUrl":"https://doi.org/10.1109/AINAW.2007.80","url":null,"abstract":"This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified it to use elliptic curve cryptography (ECC) to establish pair-wise keys for use in our user authentication scheme. The proposed scheme imposes very light computational and communication overhead, and our analysis also shows that our scheme is feasible for the real wireless sensor network applications.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
Power-Efficient and Path-Stable Broadcasting Scheme for Wireless Ad Hoc Networks 无线自组织网络的节能和路径稳定广播方案
Yeim-Kuan Chang, Y. Ting, Shang-Chun Wu
{"title":"Power-Efficient and Path-Stable Broadcasting Scheme for Wireless Ad Hoc Networks","authors":"Yeim-Kuan Chang, Y. Ting, Shang-Chun Wu","doi":"10.1109/AINAW.2007.291","DOIUrl":"https://doi.org/10.1109/AINAW.2007.291","url":null,"abstract":"The simplest broadcasting scheme in the mobile ad hoc networks (MANETs) uses flooding which may result in the broadcast storm problem. The Multipoint Relays (MPR) is another broadcasting scheme for solving the broadcast storm problem. In MPR, the mobile hosts (MHs) use a greedy algorithm to find a connected dominating set (CDS) by the exchange of 2-hop neighbor information. In order to reduce the size of CDS, the greedy algorithm used by MPR usually selects the farthest nodes from the source called the border nodes as the forwarding nodes. Since the border nodes have a higher probability of moving out the transmission range, the routing paths in MPR from the source to some destinations may be unstable. In this paper, we propose a broadcasting scheme called dynamic power-aware and stability-aware multipoint relays (DPS-MPR) which avoids selecting the border nodes as the forwarding nodes. As a result, the transmission range of MHs can be reduced for saving energy and the negative impact of unstable forwarding nodes can also be reduced. In addition, we use a range buffer to further enhance the stability of the forwarding nodes. We evaluate the performance of the proposed DPS-MPR by using NS2 and compared it with the existing schemes. The experimental result shows that DPS-MPR saves 20%~25% of energy and increases the lifetime of forwarding nodes by several seconds.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment 在基于位置的服务环境中,具有i-Throw设备的无处不在的时尚计算机
Jupyung Lee, Seungho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, K. Park
{"title":"A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment","authors":"Jupyung Lee, Seungho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, K. Park","doi":"10.1109/AINAW.2007.63","DOIUrl":"https://doi.org/10.1109/AINAW.2007.63","url":null,"abstract":"The ubiquitous fashionable computer (UFC), introduced in this paper, is a wearable computer that allows people to exploit ubiquitous computing environment in a user-friendly manner. We present the design approach and philosophy of the UFC that is wearable, aesthetic, and intuitive. The UFC supports the interoperability of various communication interfaces among WLAN, Bluetooth and ZigBee devices. We developed a wireless gesture recognition device, called i -Throw, which is small enough to be worn on one's finger like a ring. The UFC, with the help of i -Throw, can control ubiquitous environment using an intuitive hand motion. To explain the practical use of the UFC platform and the user-friendly interaction with ubiquitous environment, we implemented a ubiquitous testbed where multiple UFC users interact with various ubiquitous devices or other UFC users. In addition, we implemented a practical application which makes it possible to exchange the various objects and control ubiquitous devices very easily.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122667418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks 混合移动自组织网络中的安全实时流量
Ilkka Uusitalo, T. Väisänen, J. Latvakoski
{"title":"Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks","authors":"Ilkka Uusitalo, T. Väisänen, J. Latvakoski","doi":"10.1109/AINAW.2007.321","DOIUrl":"https://doi.org/10.1109/AINAW.2007.321","url":null,"abstract":"We describe a test environment and present results for securing real -time traffic in a hybrid mobile ad hoc network. We adapted existing security and mobility technologies into the hybrid mobile ad hoc network context and applied them to provide security for VoIP calls. We evaluated the feasibility of the technologies, and compared their behavior. We also simplified an existing ad hoc routing protocol implementation to suit the needs of our small network. Finally, measurements were carried out regarding delays, overheads and bandwidth usage of the technologies.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource-Oriented Computing: Towards a Univeral Virtual Workspace 面向资源的计算:迈向通用虚拟工作空间
Jing-Ying Chen
{"title":"Resource-Oriented Computing: Towards a Univeral Virtual Workspace","authors":"Jing-Ying Chen","doi":"10.1109/AINAW.2007.314","DOIUrl":"https://doi.org/10.1109/AINAW.2007.314","url":null,"abstract":"Emerging popular Web applications such as blogs and Wikipedia are transforming the Internet into a global collaborative environment where most people can participate and contribute. When resources created by and shared among people are not just content but also software artifacts, a much more accommodating, universal, and virtual workspace is foreseeable that can support people with diverse background and needs. To realize the goal, it requires not only necessary infrastructure support for resource deployment and composition, but also strategies and mechanisms to handle the implied complexity. We propose a service-oriented architecture in which arbitrary resources are associated with syntactical descriptors, called metaphors, based on which runtime services can be instantiated and managed. Furthermore, service composition can be achieved through syntactic metaphor composition. We demonstrate our approach via an e-Science workbench that allows user to access and combine distributed computing and storage resources in a flexible manner.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128396021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context Inferring in the Smart Home: An SWRL Approach 智能家居中的上下文推断:一种SWRL方法
V. Ricquebourg, D. Durand, D. Menga, B. Marhic, L. Delahoche, C. Logé, A. Jolly-Desodt
{"title":"Context Inferring in the Smart Home: An SWRL Approach","authors":"V. Ricquebourg, D. Durand, D. Menga, B. Marhic, L. Delahoche, C. Logé, A. Jolly-Desodt","doi":"10.1109/AINAW.2007.130","DOIUrl":"https://doi.org/10.1109/AINAW.2007.130","url":null,"abstract":"This paper deals with a context awareness system based on a service-oriented architecture dedicated to the Smart Home. In our approach, a Smart Home must be able to provide services adapted to the needs of its inhabitants. To achieve this, we propose to build a Smart environment that takes into account the ambient context of its inhabitants, providing contextually-aware services. In previous work [18], we described a four-layer architecture to manage data acquisition and context information in distributed sensor network for smart home environments. In this paper, we focus on the context model based on an OWL ontology and then on the inference layer, based on SWRL rules language. Finally, we present our current implementation.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128798679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
An Efficient Online/Offline Signcryption Scheme for MANET 一种高效的MANET在线/离线签名加密方案
Zhong Xu, Guanzhong Dai, Deming Yang
{"title":"An Efficient Online/Offline Signcryption Scheme for MANET","authors":"Zhong Xu, Guanzhong Dai, Deming Yang","doi":"10.1109/AINAW.2007.79","DOIUrl":"https://doi.org/10.1109/AINAW.2007.79","url":null,"abstract":"An efficient online/offline signcryption scheme based on elliptic curve for MANET is proposed in this paper. The proposed scheme takes lower computation and communication cost, since most of computations are carried out offline and online part is very efficient. It not only provides the security properties of confidentiality, authentication, integrity, forward secrecy of message confidentiality and secure against man-in-the-middle attacks, but also solves the key distribution problem using a node own private key and then generates a session key without the certificate authority(CA). Our scheme is especially suitable for MANET because the online computation part is very efficient and does not need a pre-existing certification authority. Empirical studies are conducted using GloMoSim to evaluate the effectiveness of our scheme. The simulation results show that the scheme is efficient in terms of cost and overhead.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Detecting Stepping-Stone with Chaff Perturbations 利用箔条摄动检测踏脚石
Han-Ching Wu, S. S. Huang
{"title":"Detecting Stepping-Stone with Chaff Perturbations","authors":"Han-Ching Wu, S. S. Huang","doi":"10.1109/AINAW.2007.151","DOIUrl":"https://doi.org/10.1109/AINAW.2007.151","url":null,"abstract":"Attackers on the Internet like to indirectly launch network intrusions by using stepping-stones. In this paper, we propose a novel approach to decrease the packet bound by performing a transformation of packet difference of two streams of a host in order to distinguish stepping-stone connections. The adjustment is critical in the case of chaff perturbation by the intruder. Previous work requires the assumption that the total chaff packets be limited by a given number. We replaced the assumption by using a given chaff rate. It is found that after transformation, the bound range is much smaller for attacking connection, resulting in smaller probability of false negative detection.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Pattern Templates for Automating Business Choreography on Web Services 用于在Web服务上自动化业务编排的模式模板
Incheon Paik, Wuhui Chen
{"title":"Pattern Templates for Automating Business Choreography on Web Services","authors":"Incheon Paik, Wuhui Chen","doi":"10.1504/IJBPIM.2013.054676","DOIUrl":"https://doi.org/10.1504/IJBPIM.2013.054676","url":null,"abstract":"Integrating and automating workflow processes have been investigated to decrease resources and increase the efficiency of e-business processes. Researchers have analyzed patterns for workflow, but little has been done to make the patterns into a systematically deployable application. In this research, we proposed templates to support established workflow patterns, and developed a framework to accommodate these templates. The proposed system analyzes pattern type from a work flow diagram, collects the necessary information for the process, and makes a connection to appropriate application system. We developed a simple prototype to show the effectiveness of our system for automated business choreography.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Data Dissemination Method for Information Sharing Based on Inter-Vehicle Communication 一种基于车际通信的信息共享数据传播方法
Hiroyuki Sago, M. Shinohara, T. Hara, S. Nishio
{"title":"A Data Dissemination Method for Information Sharing Based on Inter-Vehicle Communication","authors":"Hiroyuki Sago, M. Shinohara, T. Hara, S. Nishio","doi":"10.1109/AINAW.2007.17","DOIUrl":"https://doi.org/10.1109/AINAW.2007.17","url":null,"abstract":"In an Intelligent Transport System (ITS), information sharing based on inter-vehicle communication is effective for improving data availability. In this paper, we propose a data dissemination method for sharing data items among vehicles, which increases the opportunity for vehicles to acquire more fresh data items that users request. In our proposed method, vehicles are grouped according to their locations, and movement directions are estimated from their route information. Then, data items that are more likely to be accessed in the near future are disseminated between two groups. We also present simulation results to evaluate the performance of our proposed method.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132528189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信