{"title":"Model refinement and data filtering in high-tunnel greenhouse sensor network","authors":"Ju Wang, Kostadin Damevski, Hui Chen","doi":"10.1145/2069105.2069113","DOIUrl":"https://doi.org/10.1145/2069105.2069113","url":null,"abstract":"Precise modeling of networked sensor data is an important link to improve the quality of service of wireless actuating networks in physical world sensing and actuating. It allows the accurate prediction of environmental conditions with partial knowledge and provides means to assess the quality of sensor readings, while reducing system activity for lower battery consumption. A data model is established through past observations, extracting both temporal and spatial correlation between sensors. The model exhibits high sensitivity to the selection of observed attributes for posterior estimation. A novel data model framework is then proposed that integrates both validation and prediction of sensor readings. The framework consists of clusters of self-evolving submodels and each cluster represents a group of closely-related sensor attributes. The sub-model clusters are dynamically formed and optimized for maximum prediction accuracy.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama Abumansoor, A. Boukerche, B. Landfeldt, Samer M. J. Samarah
{"title":"Privacy preserving neighborhood awareness in vehicular ad hoc networks","authors":"Osama Abumansoor, A. Boukerche, B. Landfeldt, Samer M. J. Samarah","doi":"10.1145/2069105.2069109","DOIUrl":"https://doi.org/10.1145/2069105.2069109","url":null,"abstract":"Location information is exchanged among members of Vehicular Ad Hoc Networks (VANET) to serve many road and safety applications. Vehicles will announce their identity, position, and mobility information to their neighboring nodes. The importance of such information makes privacy a major concern. Successful implementation of VANET requires protecting the vehicle's identity at all times and preventing attackers from tracking vehicles and building traveling profiles of other users. The authorities, on the other hand, should be permitted to track certain subjects for non-repudiation and accountability purposes. Researchers have discussed privacy in VANET and have proposed different solutions to protect users' identities, such as using digital signatures. However, there is still a risk that profile building can be done by an attacker using a compromised vehicle. In this paper, we will describe the security threat and propose a solution to protect the user's privacy by eliminating the use of vehicle IDs in beacon messages and secure information handling.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental evaluation of asymmetric QoS in IEEE 802.11g wireless networks","authors":"Q. Hu, C. Williamson, A. Fapojuwo","doi":"10.1145/2069105.2069107","DOIUrl":"https://doi.org/10.1145/2069105.2069107","url":null,"abstract":"Quality of Service (QoS) can be provided in a Wireless Local Area Network (WLAN) using the Enhanced Distributed Channel Access (EDCA) mechanism specified in IEEE 802.11e. However, 802.11e WLANs are not widely deployed and not all WLAN vendors implement the 802.11e mechanisms. In this paper, we propose and evaluate an asymmetric QoS solution, in which QoS support is provided only at the wireless Access Point (AP). We believe that this approach provides a practical solution for many cases where wireless clients may not support EDCA QoS. The feasibility of this solution is studied, using an experimental approach. A QoS testbed is designed and implemented using a centralized wireless controller and lightweight AP. The measurement results show that VLAN-based asymmetric QoS provides effective prioritization and excellent performance for high-priority traffic classes, including Voice over IP (VoIP) and TCP traffic, even during severe congestion conditions. Furthermore, this approach can be easily implemented using minimal equipment.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of packet bursting scheme in IEEE 802.11e WLANs under slow rayleigh fading with non markovian stochastic petri nets","authors":"M. Escheikh, Kamel Barkaoui","doi":"10.1145/2069105.2069108","DOIUrl":"https://doi.org/10.1145/2069105.2069108","url":null,"abstract":"Although enhanced distributed coordination function EDCF mechanism brings service differentiation between different access categories, Quality of service is not guaranteed for delay sensitive applications such as voice unless further open parameters of the amendment may be supported in the implementation phase. Among these parameters we focus in this paper on packet bursting scheme. We examine Packet Bursting scheme impact on service differentiation in IEEE 802.11e enhanced distributed channel access EDCF using SPN model. Performance analysis of throughput and mean access delay versus virtual load are investigated.\u0000 Numerical results investigated show how packet bursting scheme can counteract the inherent QoS limitation of service differentiation by bringing efficiency improvement. Additionally results show advantages and limitations of Packet Bursting scheme with respect to virtual load in wireless varying environment characterized by a slow Rayleigh fading.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"mCoSS: a multi-Constraints Scheduling Strategy for WiMAX networks","authors":"Ikbal Chammakhi Msadaa, F. Filali, D. Câmara","doi":"10.1145/2069105.2069111","DOIUrl":"https://doi.org/10.1145/2069105.2069111","url":null,"abstract":"In this paper, we attempt to assemble the different pieces of the resource allocation puzzle of mobile WiMAX networks by addressing the main scheduling issues that are still open. We thus propose a novel multi-Constraints Scheduling Strategy (mCoSS) which maximizes the quality of service (QoS) degree of satisfaction for both real-time and non-real-time traffic in terms of delay and throughput. In the scheduling strategy presented in this paper, the access to the network is regulated via a traffic shaper which is inspired from the dual token bucket shaping mechanism. This technique allows traffic burstiness while bounding it. The modified dual token bucket mechanism is combined with a two-rounds scheduling algorithm reflecting the upper and lower bounds of service to be expected by each connection. The bandwidth request and grant policy adopted in these algorithms takes advantage of the different mechanisms proposed by the IEEE 802.16e standard. It adapts the choice of the appropriate technique to the service flow QoS constraints and the current availability of radio resources. Other concerns such as supporting the link adaptation capability and avoiding starvation of best effort traffic are also addressed in this solution. The performance of the proposed strategy is evaluated through simulation and compared to other scheduling solutions proposed in the literature. The obtained results show a nice tradeoff between fairness and efficiency with a high respect for the connections' QoS requirements.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":" 64","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132010548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code","authors":"Jeffrey Cashion, M. Bassiouni","doi":"10.1145/2069105.2069110","DOIUrl":"https://doi.org/10.1145/2069105.2069110","url":null,"abstract":"With the recent explosion in wireless hotspots, more and more users find themselves browsing the internet in an insecure manner. This is due to the typical lack of security in the Wi-Fi Access Points at popular hotspots such as coffee shops and airports. A common vulnerability in this scenario is when a user's cookie information is transmitted in plain-text, exposing potential session information. This would typically include the session id, which, if stolen, could lead to session hijacking, also known as sidejacking. In this paper, we present a novel way of authenticating the client to the server using what we call a Rolling Code, much like the rolling code technology used to prevent perpetrators from recording a code and replaying it to open a garage door. By using this technique, the client is able to prove to the server with each request that they are the legitimate client and no other person could have hijacked the session. Our protocol also offers optional payload integrity and confidentiality via a multi-level security model. Our Rolling Code protocol is efficient and is particularly suitable for mobile devices used in wireless networks. We implemented a benchmark of the Rolling Code authentication and used it to evaluate the performance of the scheme for different hardware platforms. Our tests have shown that the Rolling Code protocol is more computationally efficient than the hash chains approach used in a recent cookie security protocol to prevent session sidejacking.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A key management method based on an AVL tree and ECC cryptography for wireless sensor networks","authors":"Hayette Boumerzoug, B. A. Bensaber, Ismaïl Biskri","doi":"10.1145/2069105.2069115","DOIUrl":"https://doi.org/10.1145/2069105.2069115","url":null,"abstract":"In this paper; we propose a security protocol for sensor networks that provides good protection while taking into account the limited resources of the sensors. The protocol is based on an effective key management method with a minimum storage of keys. Our approach is based on the combination and improvement of two methods already proposed by the research community: cryptography based on elliptic curves and key management based on an AVL tree. Compared with RECC \"A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks\" and CECKM \"High-Effect Key Management Associated With Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-based Cluster Elliptic Curve Key Agreement\" two methods based on Diffie-Hellman elliptic curve cryptography method, our approach provides a positive impact on reducing energy consumption and memory storage. It saves significant time and memory and it reduces the exchanged packets during keys installation with fewer processing operations.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of HIP diet exchange for WSN security establishment","authors":"Pin Nie, Juho Vähä-Herttua, T. Aura, A. Gurtov","doi":"10.1145/2069105.2069114","DOIUrl":"https://doi.org/10.1145/2069105.2069114","url":null,"abstract":"Wireless Sensor Nodes are powered by limited batteries and equipped with constrained processor and memory. Therefore, security protocol must be highly efficient to fit WSNs. Meanwhile, considering the large variety of WSN applications and wide deployment, scalability and interoperability are two important concerns of adopting standardized communication protocols. HIP DEX, an IETF Internet draft, provides a generic solution to establish secure connections in WSNs. In this paper, we investigate the security features of HIP DEX based on several practical attack models. We evaluate the performance efficiency of HIP DEX in terms of energy consumption and computing latency on an experimental prototype. Our empirical results show that HIP DEX is applicable for resource constrained sensor nodes to establish hop-by-hop secure connection. In order to reinforce identity protection, we also propose tentative improvements to HIP DEX. Finally, we compare HIP DEX with SSL/TLS to highlight their respective advantages in different WSN architectures.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a balanced and reliable localization of services in heterogeneous vehicular ad hoc networks","authors":"K. Abrougui, R. Pazzi, A. Boukerche","doi":"10.1145/2069105.2069116","DOIUrl":"https://doi.org/10.1145/2069105.2069116","url":null,"abstract":"Recent studies on service discovery protocols in vehicular networks have shown promising results. However, very little work has been reported on how to integrate the fault tolerance and QoS features into service discovery protocols. These features are vital for the success of the deployment of service discovery protocols in vehicular networks. Drivers on their cars should not have their requests dissatisfied or their connections dropped because a service provider or some components between the service provider and the service requester have failed. Moreover, it is very important to provide users with services that suit better to their requests while balancing the load on service providers. In addition, for a service discovery protocol integrated with routing protocols, it is important to guarantee load balancing on routing paths between service providers and service requesters. In this paper, we present a QoS and fault tolerant location based service discovery protocol for vehicular networks. The main advantages of our protocol is its ability to tolerate service providers failure, communication links failure and roadside routers failure. Moreover, our protocol guarantees load balancing on service providers, and routing paths between service providers and service requesters. It permits also to choose service providers and routing paths between service providers and service requesters that satisfy some performance attributes specified by service requesters. We present our fault tolerance and QoS based service discovery protocol in vehicular networks, and report on its performance evaluation. Our simulation experiments show that our proposed QoS and fault tolerant based location based service discovery algorithm improves the success and connection rates significantly over the original LocVSDP.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A TRNG exploiting multi-source physical data","authors":"V. Gaglio, A. D. Paola, M. Ortolani, G. Re","doi":"10.1145/1868630.1868646","DOIUrl":"https://doi.org/10.1145/1868630.1868646","url":null,"abstract":"In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number Generator (TRNG) exploits measurements obtained from sensor nodes, in order to allow every node to produce random data upon request, without involving a trusted third party. The proposed TRNG behavior has been tested by carrying out the NIST tests, and the obtained experimental results indicate the high degree of randomness of the produced numbers.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}