Q2S and Security for Wireless and Mobile Networks最新文献

筛选
英文 中文
Model refinement and data filtering in high-tunnel greenhouse sensor network 高隧道温室传感器网络模型精化与数据滤波
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069113
Ju Wang, Kostadin Damevski, Hui Chen
{"title":"Model refinement and data filtering in high-tunnel greenhouse sensor network","authors":"Ju Wang, Kostadin Damevski, Hui Chen","doi":"10.1145/2069105.2069113","DOIUrl":"https://doi.org/10.1145/2069105.2069113","url":null,"abstract":"Precise modeling of networked sensor data is an important link to improve the quality of service of wireless actuating networks in physical world sensing and actuating. It allows the accurate prediction of environmental conditions with partial knowledge and provides means to assess the quality of sensor readings, while reducing system activity for lower battery consumption. A data model is established through past observations, extracting both temporal and spatial correlation between sensors. The model exhibits high sensitivity to the selection of observed attributes for posterior estimation. A novel data model framework is then proposed that integrates both validation and prediction of sensor readings. The framework consists of clusters of self-evolving submodels and each cluster represents a group of closely-related sensor attributes. The sub-model clusters are dynamically formed and optimized for maximum prediction accuracy.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preserving neighborhood awareness in vehicular ad hoc networks 车载自组织网络中保护隐私的邻居意识
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069109
Osama Abumansoor, A. Boukerche, B. Landfeldt, Samer M. J. Samarah
{"title":"Privacy preserving neighborhood awareness in vehicular ad hoc networks","authors":"Osama Abumansoor, A. Boukerche, B. Landfeldt, Samer M. J. Samarah","doi":"10.1145/2069105.2069109","DOIUrl":"https://doi.org/10.1145/2069105.2069109","url":null,"abstract":"Location information is exchanged among members of Vehicular Ad Hoc Networks (VANET) to serve many road and safety applications. Vehicles will announce their identity, position, and mobility information to their neighboring nodes. The importance of such information makes privacy a major concern. Successful implementation of VANET requires protecting the vehicle's identity at all times and preventing attackers from tracking vehicles and building traveling profiles of other users. The authorities, on the other hand, should be permitted to track certain subjects for non-repudiation and accountability purposes. Researchers have discussed privacy in VANET and have proposed different solutions to protect users' identities, such as using digital signatures. However, there is still a risk that profile building can be done by an attacker using a compromised vehicle. In this paper, we will describe the security threat and propose a solution to protect the user's privacy by eliminating the use of vehicle IDs in beacon messages and secure information handling.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental evaluation of asymmetric QoS in IEEE 802.11g wireless networks IEEE 802.11g无线网络中非对称QoS的实验评估
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069107
Q. Hu, C. Williamson, A. Fapojuwo
{"title":"Experimental evaluation of asymmetric QoS in IEEE 802.11g wireless networks","authors":"Q. Hu, C. Williamson, A. Fapojuwo","doi":"10.1145/2069105.2069107","DOIUrl":"https://doi.org/10.1145/2069105.2069107","url":null,"abstract":"Quality of Service (QoS) can be provided in a Wireless Local Area Network (WLAN) using the Enhanced Distributed Channel Access (EDCA) mechanism specified in IEEE 802.11e. However, 802.11e WLANs are not widely deployed and not all WLAN vendors implement the 802.11e mechanisms. In this paper, we propose and evaluate an asymmetric QoS solution, in which QoS support is provided only at the wireless Access Point (AP). We believe that this approach provides a practical solution for many cases where wireless clients may not support EDCA QoS. The feasibility of this solution is studied, using an experimental approach. A QoS testbed is designed and implemented using a centralized wireless controller and lightweight AP. The measurement results show that VLAN-based asymmetric QoS provides effective prioritization and excellent performance for high-priority traffic classes, including Voice over IP (VoIP) and TCP traffic, even during severe congestion conditions. Furthermore, this approach can be easily implemented using minimal equipment.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of packet bursting scheme in IEEE 802.11e WLANs under slow rayleigh fading with non markovian stochastic petri nets 基于非马尔可夫随机petri网的IEEE 802.11e无线局域网慢瑞利衰落下的分组爆破方案性能分析
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069108
M. Escheikh, Kamel Barkaoui
{"title":"Performance analysis of packet bursting scheme in IEEE 802.11e WLANs under slow rayleigh fading with non markovian stochastic petri nets","authors":"M. Escheikh, Kamel Barkaoui","doi":"10.1145/2069105.2069108","DOIUrl":"https://doi.org/10.1145/2069105.2069108","url":null,"abstract":"Although enhanced distributed coordination function EDCF mechanism brings service differentiation between different access categories, Quality of service is not guaranteed for delay sensitive applications such as voice unless further open parameters of the amendment may be supported in the implementation phase. Among these parameters we focus in this paper on packet bursting scheme. We examine Packet Bursting scheme impact on service differentiation in IEEE 802.11e enhanced distributed channel access EDCF using SPN model. Performance analysis of throughput and mean access delay versus virtual load are investigated.\u0000 Numerical results investigated show how packet bursting scheme can counteract the inherent QoS limitation of service differentiation by bringing efficiency improvement. Additionally results show advantages and limitations of Packet Bursting scheme with respect to virtual load in wireless varying environment characterized by a slow Rayleigh fading.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
mCoSS: a multi-Constraints Scheduling Strategy for WiMAX networks WiMAX网络的多约束调度策略
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069111
Ikbal Chammakhi Msadaa, F. Filali, D. Câmara
{"title":"mCoSS: a multi-Constraints Scheduling Strategy for WiMAX networks","authors":"Ikbal Chammakhi Msadaa, F. Filali, D. Câmara","doi":"10.1145/2069105.2069111","DOIUrl":"https://doi.org/10.1145/2069105.2069111","url":null,"abstract":"In this paper, we attempt to assemble the different pieces of the resource allocation puzzle of mobile WiMAX networks by addressing the main scheduling issues that are still open. We thus propose a novel multi-Constraints Scheduling Strategy (mCoSS) which maximizes the quality of service (QoS) degree of satisfaction for both real-time and non-real-time traffic in terms of delay and throughput. In the scheduling strategy presented in this paper, the access to the network is regulated via a traffic shaper which is inspired from the dual token bucket shaping mechanism. This technique allows traffic burstiness while bounding it. The modified dual token bucket mechanism is combined with a two-rounds scheduling algorithm reflecting the upper and lower bounds of service to be expected by each connection. The bandwidth request and grant policy adopted in these algorithms takes advantage of the different mechanisms proposed by the IEEE 802.16e standard. It adapts the choice of the appropriate technique to the service flow QoS constraints and the current availability of radio resources. Other concerns such as supporting the link adaptation capability and avoiding starvation of best effort traffic are also addressed in this solution. The performance of the proposed strategy is evaluated through simulation and compared to other scheduling solutions proposed in the literature. The obtained results show a nice tradeoff between fairness and efficiency with a high respect for the connections' QoS requirements.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":" 64","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132010548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code 一种使用滚动码防止无线网络中侧边劫持攻击的鲁棒且低成本的解决方案
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069110
Jeffrey Cashion, M. Bassiouni
{"title":"Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code","authors":"Jeffrey Cashion, M. Bassiouni","doi":"10.1145/2069105.2069110","DOIUrl":"https://doi.org/10.1145/2069105.2069110","url":null,"abstract":"With the recent explosion in wireless hotspots, more and more users find themselves browsing the internet in an insecure manner. This is due to the typical lack of security in the Wi-Fi Access Points at popular hotspots such as coffee shops and airports. A common vulnerability in this scenario is when a user's cookie information is transmitted in plain-text, exposing potential session information. This would typically include the session id, which, if stolen, could lead to session hijacking, also known as sidejacking. In this paper, we present a novel way of authenticating the client to the server using what we call a Rolling Code, much like the rolling code technology used to prevent perpetrators from recording a code and replaying it to open a garage door. By using this technique, the client is able to prove to the server with each request that they are the legitimate client and no other person could have hijacked the session. Our protocol also offers optional payload integrity and confidentiality via a multi-level security model. Our Rolling Code protocol is efficient and is particularly suitable for mobile devices used in wireless networks. We implemented a benchmark of the Rolling Code authentication and used it to evaluate the performance of the scheme for different hardware platforms. Our tests have shown that the Rolling Code protocol is more computationally efficient than the hash chains approach used in a recent cookie security protocol to prevent session sidejacking.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A key management method based on an AVL tree and ECC cryptography for wireless sensor networks 一种基于AVL树和ECC加密的无线传感器网络密钥管理方法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069115
Hayette Boumerzoug, B. A. Bensaber, Ismaïl Biskri
{"title":"A key management method based on an AVL tree and ECC cryptography for wireless sensor networks","authors":"Hayette Boumerzoug, B. A. Bensaber, Ismaïl Biskri","doi":"10.1145/2069105.2069115","DOIUrl":"https://doi.org/10.1145/2069105.2069115","url":null,"abstract":"In this paper; we propose a security protocol for sensor networks that provides good protection while taking into account the limited resources of the sensors. The protocol is based on an effective key management method with a minimum storage of keys. Our approach is based on the combination and improvement of two methods already proposed by the research community: cryptography based on elliptic curves and key management based on an AVL tree. Compared with RECC \"A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks\" and CECKM \"High-Effect Key Management Associated With Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-based Cluster Elliptic Curve Key Agreement\" two methods based on Diffie-Hellman elliptic curve cryptography method, our approach provides a positive impact on reducing energy consumption and memory storage. It saves significant time and memory and it reduces the exchanged packets during keys installation with fewer processing operations.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of HIP diet exchange for WSN security establishment 无线传感器网络安全设施中HIP饮食交换的性能分析
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069114
Pin Nie, Juho Vähä-Herttua, T. Aura, A. Gurtov
{"title":"Performance analysis of HIP diet exchange for WSN security establishment","authors":"Pin Nie, Juho Vähä-Herttua, T. Aura, A. Gurtov","doi":"10.1145/2069105.2069114","DOIUrl":"https://doi.org/10.1145/2069105.2069114","url":null,"abstract":"Wireless Sensor Nodes are powered by limited batteries and equipped with constrained processor and memory. Therefore, security protocol must be highly efficient to fit WSNs. Meanwhile, considering the large variety of WSN applications and wide deployment, scalability and interoperability are two important concerns of adopting standardized communication protocols. HIP DEX, an IETF Internet draft, provides a generic solution to establish secure connections in WSNs. In this paper, we investigate the security features of HIP DEX based on several practical attack models. We evaluate the performance efficiency of HIP DEX in terms of energy consumption and computing latency on an experimental prototype. Our empirical results show that HIP DEX is applicable for resource constrained sensor nodes to establish hop-by-hop secure connection. In order to reinforce identity protection, we also propose tentative improvements to HIP DEX. Finally, we compare HIP DEX with SSL/TLS to highlight their respective advantages in different WSN architectures.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Towards a balanced and reliable localization of services in heterogeneous vehicular ad hoc networks 在异构车辆自组织网络中实现平衡可靠的服务定位
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069116
K. Abrougui, R. Pazzi, A. Boukerche
{"title":"Towards a balanced and reliable localization of services in heterogeneous vehicular ad hoc networks","authors":"K. Abrougui, R. Pazzi, A. Boukerche","doi":"10.1145/2069105.2069116","DOIUrl":"https://doi.org/10.1145/2069105.2069116","url":null,"abstract":"Recent studies on service discovery protocols in vehicular networks have shown promising results. However, very little work has been reported on how to integrate the fault tolerance and QoS features into service discovery protocols. These features are vital for the success of the deployment of service discovery protocols in vehicular networks. Drivers on their cars should not have their requests dissatisfied or their connections dropped because a service provider or some components between the service provider and the service requester have failed. Moreover, it is very important to provide users with services that suit better to their requests while balancing the load on service providers. In addition, for a service discovery protocol integrated with routing protocols, it is important to guarantee load balancing on routing paths between service providers and service requesters. In this paper, we present a QoS and fault tolerant location based service discovery protocol for vehicular networks. The main advantages of our protocol is its ability to tolerate service providers failure, communication links failure and roadside routers failure. Moreover, our protocol guarantees load balancing on service providers, and routing paths between service providers and service requesters. It permits also to choose service providers and routing paths between service providers and service requesters that satisfy some performance attributes specified by service requesters. We present our fault tolerance and QoS based service discovery protocol in vehicular networks, and report on its performance evaluation. Our simulation experiments show that our proposed QoS and fault tolerant based location based service discovery algorithm improves the success and connection rates significantly over the original LocVSDP.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A TRNG exploiting multi-source physical data 利用多源物理数据的TRNG
Q2S and Security for Wireless and Mobile Networks Pub Date : 2010-10-20 DOI: 10.1145/1868630.1868646
V. Gaglio, A. D. Paola, M. Ortolani, G. Re
{"title":"A TRNG exploiting multi-source physical data","authors":"V. Gaglio, A. D. Paola, M. Ortolani, G. Re","doi":"10.1145/1868630.1868646","DOIUrl":"https://doi.org/10.1145/1868630.1868646","url":null,"abstract":"In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number Generator (TRNG) exploits measurements obtained from sensor nodes, in order to allow every node to produce random data upon request, without involving a trusted third party. The proposed TRNG behavior has been tested by carrying out the NIST tests, and the obtained experimental results indicate the high degree of randomness of the produced numbers.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信