T. Kamina, Toshinori Aoki, Yoshiteru Eto, N. Koshizuka, Jun Yamada, K. Sakamura
{"title":"Verifying Identifier-Authenticity in Ubiquitous Computing Environment","authors":"T. Kamina, Toshinori Aoki, Yoshiteru Eto, N. Koshizuka, Jun Yamada, K. Sakamura","doi":"10.1109/AINAW.2007.368","DOIUrl":"https://doi.org/10.1109/AINAW.2007.368","url":null,"abstract":"In ubiquitous computing environment, identification of objects and places in the real world is important, and 2D printing code is useful to store identifiers of them. However, since it is easy to modify the content stored in the 2D code, we must verify whether the identifier written in the 2D code is indeed issued by the authorized organization. In this paper, we propose a verification method for identifiers stored in the 2D code. Our system makes sure that the identifier is indeed issued by the authorized organization, and the size of pair of identifier and its authenticator is small enough to be written in a 2D code. Furthermore, the proposed system has compatibility with the existing 2D code reading software. Our system is now operated in practical use, and some services based on this mechanism have been developed.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy Consumption","authors":"Abhishek Pillai, Wei Zhang, L. Yang","doi":"10.1109/AINAW.2007.179","DOIUrl":"https://doi.org/10.1109/AINAW.2007.179","url":null,"abstract":"The number of functional units can have significant impact on both the performance and energy consumption of VLIW processors. This paper uses a design exploration approach to find optimal integer functional unit configurations for achieving the best EDP (energy delay product) results for different media applications. Our experimental results quantitatively indicate that the optimal number of integer functional units should match the instruction level parallelism that can be extracted from the applications to balance both performance and energy optimally for VLIW processors.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of the RTS/CTS Handshake on TCP","authors":"S. Papanastasiou, M. Ould-Khaoua, V. Charissis","doi":"10.1109/AINAW.2007.352","DOIUrl":"https://doi.org/10.1109/AINAW.2007.352","url":null,"abstract":"Previous research enquiries into TCP performance in MANETs have largely assumed that the 802.11 RTS/CTS mechanism remains in full effect throughout the connection time. In this work we evaluate the effects on TCP goodput of utilising other modes of operation for the 802.11 handshake whilst remaining compliant with the original specification. To identify the source of the goodput discrepancies amongst the different modes of operation we introduce two new metrics to characterise spatial connection along a TCP connection and then use them to account for TCP goodput in string and mesh topologies when using different RTS/CTS strategies.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Traffic Classification Algorithm for Intrusion Detection","authors":"Tarek Abbes, A. Bouhoula, M. Rusinowitch","doi":"10.1109/AINAW.2007.62","DOIUrl":"https://doi.org/10.1109/AINAW.2007.62","url":null,"abstract":"We propose in this paper a new intrusion detection method for supporting high speed traffic. As in firewalls and routers, we rely on packet classification to specialize the task of several network intrusions detection systems (NIDSs). We build several traffic classes regarding the network configuration and the traffic properties. Then we consider the NIDS characteristics to select for each class the suitable intrusion detection method. Our idea offers several advantages such as load balancing, fault tolerance and attack prevention. We express our traffic classification method by means of traffic division rules. Then we adequately construct the paths of these rules to reduce the overlapping cases. We transform the rule paths in a prefix trie that we complete by failure links to finally get a directed acyclic graph (DAG). We believe that our classification method is useful for other problems such as firewalling, routing and billing.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"mCoupons: An Application for Near Field Communication (NFC)","authors":"Sandra Dominikus, M. Aigner","doi":"10.1109/AINAW.2007.230","DOIUrl":"https://doi.org/10.1109/AINAW.2007.230","url":null,"abstract":"Near field communication (NFC) is a short-range wireless communication standard. It is very comfortable for the user as communication starts without any further configuration steps when bringing two devices very close together. This property makes the standard well suitable for the use with mobile coupons (we call it mCoupons). Nowadays, coupons are a very common way for companies to promote their products or services. These coupons are available as paper-based coupons or electronic coupons (which for example are used on the web). We propose a new form of coupons, so called mCoupons, which can be downloaded from a poster or a newspaper equipped with a passive NFC device to a mobile device. With this mobile device the user can then cash in the mCoupon at the cashier. In most of the cases, the value of each coupon is relatively low but misuse in larger scale can result in a major damage for a company. Therefore, mCoupons shall be secured against attackers. In this paper, we propose protocols for a secure mCoupon system using NFC technology. This protocol can be a basis for future micro-payment or ticketing services.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Purpose Models for QoS Monitoring","authors":"Stefan Wallin, Viktor Leijon","doi":"10.1109/AINAW.2007.262","DOIUrl":"https://doi.org/10.1109/AINAW.2007.262","url":null,"abstract":"Telecom operators face an increasing need for service quality management to cope with competition and complex service portfolios in the mobile sector. Improvements in this area can lead to significant market benefits for operators in highly competitive markets. We propose an architecture for a service monitoring tool, including a time aware formal language for model specification. Using these models allows for increased predictability and flexibility in a constantly changing environment.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linearized Transformation of RF Data for Capsule Tracking in Wireless Telemetry","authors":"K. Arshak, F. Adepoju","doi":"10.1109/AINAW.2007.222","DOIUrl":"https://doi.org/10.1109/AINAW.2007.222","url":null,"abstract":"In this paper, we discuss system and method of determining the real-time location of an omnidirectional diagnostic radio frequency (RF) system while the object (transmitter) is moving freely inside an inaccessible organ. A specific application to the human gastrointestinal (GI) organ is presented, showing the importance of the method in accessing a specific site for drug administration or for extracting fluid or tissue samples for biopsy and similar medical investigations. For practical purposes, we assume omnidirectional transmitter transmitting at 433 MHz, Input power 1 W, and Es/No = 20 dB (corresponding to the linear region of the target transceiver). We also discuss the method for using the original analogue signal, after conversion to voltage, for position tracking. In our algorithm, we employed a path loss scenario based on the popular log-normal model to simulate the effects of organs on signal quality between transmitter and receiver at various distances.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Data Compression and Cryptography: Another Way to Increase the Information Security","authors":"Chuanfeng Lv, Qiangfu Zhao","doi":"10.1109/AINAW.2007.208","DOIUrl":"https://doi.org/10.1109/AINAW.2007.208","url":null,"abstract":"The main purpose of data compression is to reduce the memory space or transmission time, while that of cryptography is to keep the security of the data. So far, these two technologies have been studied separately. This is because any data can be compressed if necessary, and then encrypted. The problem is that, with the rapid progress in computing technology, the encrypted data will not be secure any more after a few years. Once the data are decrypted, all secret will be leaked. To solve this problem, in this paper we propose a new way to increase the information security through integration of data compression and cryptography. Specifically, the data to be considered here are images, and the compression technique is the k-PCA, which was proposed by us recently for image compression. The main advantage of using k-PCA is that this technique is data-dependent. Unlike other existing universal compression techniques, such as DCT, DWT, and so on, the non-linear transformation function used in k-PCA are found using the data to be compressed. Thus, even if the encrypted data are deciphered by some malicious persons, it is hard for them to reconstruct the images without the transformation function, which is encrypted and kept by the user as a secret key. To encrypt the compressed data and the transformation function, we can use any existing techniques, as long as they are relatively secure.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentient Networks: A New Dimension in Network Capability","authors":"B. S. Manoj, R. Hegde, B. Rao, R. Rao","doi":"10.1109/AINAW.2007.326","DOIUrl":"https://doi.org/10.1109/AINAW.2007.326","url":null,"abstract":"As computer networks evolve to the next generation, they offer flexible infrastructures for communication as well as high vulnerability. In order to sustain the reliability, to prevent misuse, and to provide radically new services, these networks need new capabilities in non-traditional domains of operation such as perception and consciousness. Therefore, we propose Sentient Networks, as an early approach towards realizing them. There are several applications for such networking capability. For one, sentient networks can enable packet detection in a blackbox manner, detect encryption of data transferred, detecting and classifying data types such as voice, video, and data. Some of the applications of such capabilities, for example, include the use of emotion content of the voice packets through a network and classifying these packets into normal, moderately panicked, and extremely panicked. Such classifications can be used to provide better QoS schemes for panicked callers. We obtained a packet detection accuracy of about 65-70% for data packets and about 98% accuracy for detecting encrypted TCP packets. The emotion-aware QoS provision mechanism provided approximately 60% improvement in delay performance for voice packets generated by panicked sources.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying-Hong Wang, Chih-Peng Hsu, Yi-Chien Lin, Chien-Shan Kuo, H. Ho
{"title":"A Routing Method by Reactive Energy Decision in Wireless Sensor Networks","authors":"Ying-Hong Wang, Chih-Peng Hsu, Yi-Chien Lin, Chien-Shan Kuo, H. Ho","doi":"10.1109/AINAW.2007.49","DOIUrl":"https://doi.org/10.1109/AINAW.2007.49","url":null,"abstract":"The wireless sensor network (WSN) was extensively deployed and researched recently. While taking the advantage of smaller dimension, lower cost and simple structure of the sensor nodes, more restrictions come with sensors. Therefore, the limited power of sensor nodes is the most direct and difficult problem we meet. The limitation on the energy of sensor nodes creates the bottlenecks when designing the suitable routing protocols. In order to solve the problem of limited energy, the loading of nodes has to be distributed as possible as it could. If the energy consumption can be shared averagely by most nodes, then the lifetime of sensor networks will be enlarged. Thus we propose the routing protocol called Reactive Energy Decision Routing Protocol (REDRP) for the sensor network which considers several representative routing protocols in different structures. This protocol will create the routes in a reactive routing method to transmit the data gathered from nodes and the REDRP will use the residual energy of nodes as the routing decision for energy-aware. The results of simulation show that the more fairness usage of sensor nodes, the more energy consumption of entire network will be distributed by our protocol and the longer the lifetime of nodes.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}