2009 First International Conference on Ubiquitous and Future Networks最新文献

筛选
英文 中文
Investigation of handoffs for IEEE 802.11 networks in vehicular environment 车载环境下IEEE 802.11网络切换研究
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174291
Daehan Kwak, Jeonghoon Mo, Moonsoo Kang
{"title":"Investigation of handoffs for IEEE 802.11 networks in vehicular environment","authors":"Daehan Kwak, Jeonghoon Mo, Moonsoo Kang","doi":"10.1109/ICUFN.2009.5174291","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174291","url":null,"abstract":"Users in vehicles who are interested in accessing Internet services can be achieved by connecting to IEEE 802.11 WLAN APs along the roadside. However, due to the small coverage range of 802.11 APs and high mobility of vehicles, handoffs frequently occur as vehicles migrate across a series of adjacent access points which can be a major source of interruption to seamless connections and throughput reduction. In this paper, we investigate the well-known handoff schemes that have worked to reduce the 802.11 handoff latency and address the possible issues that arise when applied to vehicular scenarios. Our main objective is to provide groundwork for future research on the enhancement of fast handoffs for vehicular scenarios and emphasize that smart and optimized fast handoffs are a critical requirement for seamless connectivity. To meet these requirements, we also suggest that trajectory information (on-board navigation systems) along with neighbor AP information (802.11k) have the potential to provide smart and fast handoffs to support seamless communication in a vehicular scenario.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Provisioning geographic data-centric dissemination in Wireless Sensor Networks 无线传感器网络中以地理数据为中心的分发
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174280
Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon
{"title":"Provisioning geographic data-centric dissemination in Wireless Sensor Networks","authors":"Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon","doi":"10.1109/ICUFN.2009.5174280","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174280","url":null,"abstract":"In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching to process data or reduce redundancy in message delivery. We implemented the framework in ns-2 simulator, and conducted a simulation study to evaluate its performance in comparison with existing routing protocols. The simulation results indicate that the framework enhances message delivery ratio, reduces message delivery overhead, and saves energy consumption, regardless of wireless link errors.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grey-box mechanism design in peer-to-peer cooperative networking 点对点协作网络中的灰盒机制设计
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174286
Simon G. M. Koo
{"title":"Grey-box mechanism design in peer-to-peer cooperative networking","authors":"Simon G. M. Koo","doi":"10.1109/ICUFN.2009.5174286","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174286","url":null,"abstract":"We have presented the need and our position on human-centric mechanism design. In the design, we identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122895465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A clustering-based multi-channel Vehicle-to-Vehicle (V2V) communication system 基于集群的多通道车对车通信系统
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174290
Ranran Ding, Qing-An Zeng
{"title":"A clustering-based multi-channel Vehicle-to-Vehicle (V2V) communication system","authors":"Ranran Ding, Qing-An Zeng","doi":"10.1109/ICUFN.2009.5174290","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174290","url":null,"abstract":"Traffic safety in any type of transportation systems is a global concerned issue. In this paper, we propose a clustering-based multi-channel Vehicle-to-Vehicle communication system to provide traffic accident avoidance mechanism. In the proposed system, vehicles are self-organized into different clusters, and the traditional single common medium in ad hoc networks has been divided into multiple control channels and a single data channel. An infrastructure-based TDMA/CDMA technique is designed for the intra- and inter-cluster communications via data channel. The IEEE 802.11 CSMA/CA protocol is utilized by control channels. Our system is evaluated by extensive simulations. The simulation results show the proposed system can support traffic safety efficiently.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A heterogeneous peer-to-peer network testbed 异构点对点网络测试平台
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174282
V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung
{"title":"A heterogeneous peer-to-peer network testbed","authors":"V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung","doi":"10.1109/ICUFN.2009.5174282","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174282","url":null,"abstract":"In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some of the proposed protocols to be developed and tested on the testbed.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the reliability of backbone-assisted end-to-end transmissions in WSNs 无线传感器网络中骨干网辅助端到端传输的可靠性研究
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174278
Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo
{"title":"On the reliability of backbone-assisted end-to-end transmissions in WSNs","authors":"Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo","doi":"10.1109/ICUFN.2009.5174278","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174278","url":null,"abstract":"Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at larger distances. In this paper, we evaluate the reliability of backbone-assisted routing and dissemination in WSNs. In particular, we use reliability theory to investigate two important problems: a) if sensor node to backbone/gateway node ratio is fixed in a unit area, what is the maximum achievable reliability? b) How many wired hops or gateway nodes are required to achieve a given reliability? Finally we analyze the cost and benefit incurred by adding gateway nodes to a backbone-assisted WSN and observe that after a certain threshold adding more backbone nodes to the WSN provides negligible improvement in the overall end-to-end reliability.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Behavioral learning of exposed terminals in IEEE 802.11 wireless networks IEEE 802.11无线网络中暴露终端的行为学习
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174313
Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee
{"title":"Behavioral learning of exposed terminals in IEEE 802.11 wireless networks","authors":"Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee","doi":"10.1109/ICUFN.2009.5174313","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174313","url":null,"abstract":"In this paper, we tackle issues on the exposed terminal problem in IEEE 802.11 based wireless networks from a simulative perspective by investigating the internal relationship of node transmission behaviors under various network scenarios. The proposed solution is designed to learn node behaviors according to incoming traffic patterns and to assist wireless nodes make accurate transmission judgment to avoid exposed terminal problems as much as possible. Extensive simulations using ns-2 have been performed to validate the proposed scheme by varying system parameters including carrier sense range and hop counters. Our experimental outcomes show that the proposed solution yields performance gains in terms of aggregate throughput in excess of 10% to 15% compared to the standard.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network mobility route optimization with certificate-based authentication 基于证书认证的网络移动路由优化
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174309
C. Bauer
{"title":"Network mobility route optimization with certificate-based authentication","authors":"C. Bauer","doi":"10.1109/ICUFN.2009.5174309","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174309","url":null,"abstract":"The International Civil Aviation Organization has adopted IPv6 as the network protocol for the future Aeronautical Telecommunications Network, with Mobile IPv6 (MIPv6) as the baseline protocol to provide IP mobility. For aircraft, the Network Mobility (NEMO) extension to MIPv6 has to be considered, but this protocol does not yet provide any Route Optimization procedure, although many proposals do exist. We present a new mechanism that complements an existing Route Optimization proposal for NEMO, thus making it feasible for the aeronautical environment. This approach is based on certificates that should allow reducing signalling overhead and handover delay while providing a higher level of security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Rule-based auditing system for software security assurance 基于规则的软件安全保障审计系统
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174311
C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi
{"title":"Rule-based auditing system for software security assurance","authors":"C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi","doi":"10.1109/ICUFN.2009.5174311","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174311","url":null,"abstract":"We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Convergent design in ubiquitous computing 普适计算中的融合设计
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174292
Z. Segall
{"title":"Convergent design in ubiquitous computing","authors":"Z. Segall","doi":"10.1109/ICUFN.2009.5174292","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174292","url":null,"abstract":"Ubiquitous computing and networking have been fertile grounds for innovation while presenting the challenge of realizing a superior user experience and a viable business model. Unassumingly exploring both the difficult task of innovation and the user experience design, this short contribution will briefly document the emergent trend of combining science and engineering with fields of studies that are considered non-science and non-engineering such as design, fashion and visual arts. The thesis of this work is that ubiquitous computing and networking could substantially benefit from such integrative approach.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信