2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks最新文献

筛选
英文 中文
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings 减少未来基于ip的无线网络中的切换延迟:具有同步绑定的代理移动IPv6
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594849
M. Bargh, Bob Hulsebosch, H. Eertink, G. Heijenk, Jeroen Idserda, J. Laganier, A. Prasad, A. Zugenmaier
{"title":"Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings","authors":"M. Bargh, Bob Hulsebosch, H. Eertink, G. Heijenk, Jeroen Idserda, J. Laganier, A. Prasad, A. Zugenmaier","doi":"10.1109/WOWMOM.2008.4594849","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594849","url":null,"abstract":"Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well with slow connection setups of some wireless technologies. In this paper we propose an enhancement of Proxy MIPv6 (PMIPv6) with Simultaneous bindings. The result, called SPMIPv6, is a proactive network- controlled handover solution that allows some handover processes to be carried proactively while the mobile node is connected to the serving network. We analyze SPMIPv6 performance and show that the handover latency can be limited to one RTT between the mobile node and the target access router, which is typically below 10ms, and that the packet loss due to handover can be decreased and eliminated by appropriately buffering packets at the target access router. Moreover, our performance evaluation based on a SPMIPv6 implementation shows no TCP and UDP performance degradation during handovers. Two important characteristics of SPMIPv6 are its robustness to incorrect handover predictions and its built-in features to accommodate large network attachment latencies.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
BOWL: Design and implementation of a (connectionless) broadcasting system over wireless LAN 在无线局域网上(无连接)广播系统的设计和实现
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594906
Kartik Muralidharan, K. Dhanapal, A. Chowdhury
{"title":"BOWL: Design and implementation of a (connectionless) broadcasting system over wireless LAN","authors":"Kartik Muralidharan, K. Dhanapal, A. Chowdhury","doi":"10.1109/WOWMOM.2008.4594906","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594906","url":null,"abstract":"A truly pervasive computing environment can only be created if ubiquitous computation power can collaborate seamlessly to create superior user experience. With the adoption of mobile computing platforms on the rise, we have explored how the IEEE 802.11 wireless access standards can be used to enable a device to be more aware of the capabilities of the infrastructure in its surroundings. Specifically, we have been able to effectively transfer information to these WiFi enabled devices without explicit connections being established and therefore our solution is proven to be much more scalable. We have also showcased a pilot application using the broadcast over wireless LAN (BOWL) technology.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimizations for charged service provision in Mobile Ad Hoc Networks 移动自组织网络中收费服务提供的优化
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594863
C. Ververidis, George C. Polyzos
{"title":"Optimizations for charged service provision in Mobile Ad Hoc Networks","authors":"C. Ververidis, George C. Polyzos","doi":"10.1109/WOWMOM.2008.4594863","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594863","url":null,"abstract":"Optimized service provisioning is a challenging problem in dynamic environments such as mobile ad hoc networks (MANETs). Most of the existing approaches assume an environment, where service provision is free (and dictated) and servers do not have an incentive to maximize their benefit. In this paper we consider the nodes in MANETs to be independent, rational agents trying to maximize their profits through service provision. We model this problem as a generalized assignment problem (GAP). We adopt a pay-as-you-go model and introduce into the proposed profit maximization algorithm expected payoffs based on estimates of server-to-client connectivity. We define connectivity as the lifetime of the network connection between a client and a server. We experimentally study cases with non-cooperative and cooperative servers and investigate the gain of the estimate based maximization algorithm versus a classic maximization algorithm, which does not take into account the networkpsilas dynamics that affect server-to-client connectivity. The results show that our approach achieves up to three-fold improved server profits compared to the classical one and is especially suited for MANETs with high-mobility.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125176089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless networks security: Proof of chopchop attack 无线网络安全:短刀攻击的证明
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594924
M. Guennoun, A. Lbekkouri, Amine Benamrane, Mohamed Ben-Tahir, K. El-Khatib
{"title":"Wireless networks security: Proof of chopchop attack","authors":"M. Guennoun, A. Lbekkouri, Amine Benamrane, Mohamed Ben-Tahir, K. El-Khatib","doi":"10.1109/WOWMOM.2008.4594924","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594924","url":null,"abstract":"An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without knowing the encryption key. There has been no theoretical proof of the functionality of the attack. In this paper, we will give a review of the attack and build a mathematical model to prove theoretically that the attack is capable of decrypting messages in WEP enabled wireless networks without requiring the knowledge of the encryption key.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The EXC toolkit for real-world experiments with wireless multihop networks EXC工具包用于无线多跳网络的实际实验
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594901
W. Kiess, T. Ogilvie, M. Mauve
{"title":"The EXC toolkit for real-world experiments with wireless multihop networks","authors":"W. Kiess, T. Ogilvie, M. Mauve","doi":"10.1109/WOWMOM.2008.4594901","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594901","url":null,"abstract":"In this paper, we present a methodology and a toolkit to conduct tightly controlled real-world experiments in wireless multihop networks. The main features of our EXC toolkit are a plug-in architecture for easy integration of new functionality, simple scheduling of experiment runs, direct monitoring of experiments, easy management of node mobility, and high portability. EXC does not require specific hardware and can be used for investigating applications and algorithms in real-world environments. We explain the basic features of the toolkit and examine these by means of an experiment with a special focus on repeatability.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Motion vector processing using bidirectional frame difference in motion compensated frame interpolation 运动矢量处理中利用双向帧差进行运动补偿帧插值
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594914
Ai-Mei Huang, Truong Q. Nguyen
{"title":"Motion vector processing using bidirectional frame difference in motion compensated frame interpolation","authors":"Ai-Mei Huang, Truong Q. Nguyen","doi":"10.1109/WOWMOM.2008.4594914","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594914","url":null,"abstract":"In this paper, we address the potential issues in bidirectional motion compensated frame interpolation when the received motion vector field is directly used. Based on this motion vector analysis, we therefore propose using bidirectional motion vector processing method to eliminate the ghost artifacts around the moving objects. The artifacts caused by large motion vector magnitude can be effectively removed by correcting motion vectors bidirectionally. Moreover, since the proposed motion vector selection process chooses the best motion vector from adjacent motion vectors, the computational complexity can be greatly reduced comparing to motion estimation. We also demonstrate how to obtain clearer object edges by allowing displacement adjustment during the bidirectional motion vector processing. Experimental results show that the proposed algorithm outperforms other methods in terms of visual quality.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scheduling aware network flow models for multi-hop wireless networks 多跳无线网络的调度感知网络流模型
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594866
Vinay Kolar, N. Abu-Ghazaleh
{"title":"Scheduling aware network flow models for multi-hop wireless networks","authors":"Vinay Kolar, N. Abu-Ghazaleh","doi":"10.1109/WOWMOM.2008.4594866","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594866","url":null,"abstract":"Network flow models have proven to be an effective tool in the analysis, optimization and design of network protocols. Critical to the success of these models in general multi-hop wireless networks (MHWNs) is an accurate estimation of the effect of CSMA scheduling. While the existing models capture coarse grained estimates of interference, they do not account for the substantial impact of MAC scheduling. On the other hand, accurate models of throughput in CSMA networks exist. However, they are unsuitable for use as a part of a network flow formulation because of their complexity and some of their underlying assumptions. This paper contributes an efficient and constructive model to estimate the effect of scheduling on interfering links in general MHWN settings. We integrate this approach with a network flow routing model which works with aggregate estimates of capacity to improve the quality of the solution. Simulation results show that accounting for scheduling effects leads to large improvements in the quality of the solution.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
C/I gains in a single frequency network using TD-CDMA over a unicast network 在单播网络上使用TD-CDMA的单频网络中的C/I增益
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594907
S. Wong, T. Wilkinson, S. Stoker
{"title":"C/I gains in a single frequency network using TD-CDMA over a unicast network","authors":"S. Wong, T. Wilkinson, S. Stoker","doi":"10.1109/WOWMOM.2008.4594907","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594907","url":null,"abstract":"This paper investigates the C/I gain of a single frequency network for an MBSFN network using TD-CDMA over an equivalent unicast network based on measurements from a trial network and simulations. It is shown that a cell edge C/I gain of 14.4 dB can be achieved in the trial network giving an increase of 59% in coverage by using a SFN over a unicast network.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMO: A statistical encounter-based mobility model for simulating delay tolerant networks EMO:一种用于模拟延迟容忍网络的基于统计遭遇的移动性模型
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594848
F. Tan, Youmna Borghol, S. Ardon
{"title":"EMO: A statistical encounter-based mobility model for simulating delay tolerant networks","authors":"F. Tan, Youmna Borghol, S. Ardon","doi":"10.1109/WOWMOM.2008.4594848","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594848","url":null,"abstract":"We propose EMO, a model to evaluate delay tolerant networks (DTN) and opportunistic systems, which focuses on simulating encounter events between mobile radios, rather than node locations as done in existing models and simulators. Our approach introduces a more accurate simulation of DTNs on the main system timescale (the encounter timescale), while trading off some accuracy at the bit-level, through an abstraction of radio propagation simulation. To design EMO, we extract and characterize the necessary parameters from experimental data and propose a method to generate synthetic node encounter traces based on this characterization. The output of the model is validated using hold-out cross-validation method. Our validation results indicate that EMO is able to maintain the statistical properties of experimental data over a wide range of time (simulation duration) and space (number of nodes) scales, with mean square errors of less than 3% for the main system parameters.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A method for minimizing unnecessary handovers in heterogeneous wireless networks 一种在异构无线网络中最小化不必要的切换的方法
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594871
Xiaohuan Yan, Y. Sekercioglu, N. Mani
{"title":"A method for minimizing unnecessary handovers in heterogeneous wireless networks","authors":"Xiaohuan Yan, Y. Sekercioglu, N. Mani","doi":"10.1109/WOWMOM.2008.4594871","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594871","url":null,"abstract":"In near future, various wireless access technologies will be used together to provide seamless and cost effective connectivity to mobile users. Multiple wireless access systems with overlapping coverage fields will be accessible to a mobile terminal with multiple interfaces. One problem arising from the availability of alternatives is the unnecessary occurrences of handovers (especially vertical ones) that lead to excessive resource consumption. To avoid this, a suite of algorithms need to be deployed to limit the number of handovers. In this paper, we present an algorithm which is run in the mobile terminal and minimizes the number of handovers when the device detects the presence of wireless local area network (WLAN) signals. Conventionally, a mobile terminal should switch from cellular to WLAN whenever WLAN connectivity is available, to make use of the WLAN's high speed and low cost as much as possible. However, a considerable proportion of these handovers will be detrimental to the call quality due to potential failures. Our algorithm reduces the number of handovers whenever the predicted traveling distance inside the WLAN cell is smaller than a threshold value. Through performance analysis we show that our algorithm successfully minimizes the probability of unnecessary handovers, and through simulation we discuss about the accuracy of the distance prediction based on the received signal strength measurements.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信