2009 4th International Symposium on Wireless Pervasive Computing最新文献

筛选
英文 中文
Using Debt Mechanism to Achieve Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Channel 利用债务机制实现多状态信道无线网络的比例延迟和损失分化
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800613
Yu-Chin Szu
{"title":"Using Debt Mechanism to Achieve Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Channel","authors":"Yu-Chin Szu","doi":"10.1109/ISWPC.2009.4800613","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800613","url":null,"abstract":"Many algorithms for providing proportional delay differentiation and proportional loss differentiation have been proposed under the environment of wired networks. However, these algorithms suffer from difficulties when meet some distinct characteristics, such as location dependent, high error-rate or time varying channel capacity, which exist in wireless networks. This paper proposes a novel algorithm, Debt-aware Proportional Delay and Loss differentiation (DPDL), including a debt-aware scheduler and a debt-aware dropper. It can achieve proportional delay and loss by considering the channel state and debt information. From simulation results, DPDL actually achieves proportional delay differentiation, proportional loss differentiation, lower queuing delay and loss and higher throughput, compared with the other methods in wireless environment.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"762 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Key Management for Lightweight Ad-hoc Routing Authentication 轻量级自组织路由认证的密钥管理
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800590
Dat Tien Nguyen, B. Soh
{"title":"Key Management for Lightweight Ad-hoc Routing Authentication","authors":"Dat Tien Nguyen, B. Soh","doi":"10.1109/ISWPC.2009.4800590","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800590","url":null,"abstract":"Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on threshold cryptography into a lightweight authentication using digital signature to avoid the latency. Our purpose is to provide a full access control solution, from key management to authenticating each traffic packet.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Aware Dynamic Reconfiguration of Mobile Patient Monitoring Systems 移动患者监测系统的上下文感知动态重构
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800577
H. Mei, B. V. van Beijnum, P. Pawar, I. Widya, H. Hermens
{"title":"Context-Aware Dynamic Reconfiguration of Mobile Patient Monitoring Systems","authors":"H. Mei, B. V. van Beijnum, P. Pawar, I. Widya, H. Hermens","doi":"10.1109/ISWPC.2009.4800577","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800577","url":null,"abstract":"A mobile monitoring system for ambulant patients typically monitors bio-signals of a patient, processes and distributes these signals to formal caregivers. Often the monitoring service is long lasting, ranging from hours, days, to even months. The tasks involved in this end-to-end service are distributed over a networked ICT infrastructure and an optimal assignment may be found using task assignment techniques. To accommodate for the network and system resource dynamics, a configured system based on the optimal assignment over time may require a task redistribution. This capability is made possible using principles from autonomic computing where the operational environment is monitored, and based on significant operational changes a new optimal task assignment is computed, a reconfiguration plan is constructed and executed. In order for this approach to be effective, this control loop itself needs to be efficient, fast and minimally disruptive. In this paper we propose a computational scheme to estimate the quality of this control loop, the so-called reconfiguration cost. To this end, we propose an OSGi based task execution and control environment, a simple reconfiguration planning scheme based on the OSGi service bundle lifecycle, and a computational model to estimate the reconfiguration costs. Initial results using a prototype implementation are reported.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
QoS Support over IEEE 802.11e in Multirate Networks 多速率网络中基于IEEE 802.11e的QoS支持
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800603
H. Liang, N. Chilamkurti, S. Zeadally, C. Ke
{"title":"QoS Support over IEEE 802.11e in Multirate Networks","authors":"H. Liang, N. Chilamkurti, S. Zeadally, C. Ke","doi":"10.1109/ISWPC.2009.4800603","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800603","url":null,"abstract":"This paper addresses the QoS support issue of IEEE 802.11e in multirate networks. Prior researches focused on the \"performance anomaly\" problem without QoS consideration. We show the QoS support is insufficient in the current 802.11e standard and related methods make it worse by using NS-2 simulation tests. We propose a hybrid method that maintains the quality of highest priority traffic and enhance the system performance concurrently. We also compare its performance with other proposed methods. Our results demonstrate that our proposed hybrid method can efficiently support the time constraints of voice flows in various network conditions. Moreover, the system throughput is improved by the hybrid method when compared to the IEEE 802.11e standard.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Architecture for IEEE 802.15.4-based Wireless Sensor Network 基于IEEE 802.15.4的无线传感器网络安全体系结构
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800607
Taeshik Shon, Bonhyun Koo, Hyohyun Choi, Yongsuk Park
{"title":"Security Architecture for IEEE 802.15.4-based Wireless Sensor Network","authors":"Taeshik Shon, Bonhyun Koo, Hyohyun Choi, Yongsuk Park","doi":"10.1109/ISWPC.2009.4800607","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800607","url":null,"abstract":"A wireless sensor network consists of low power devices which have limited computing resources. Thus, energy consumption is one of the most significant issues in wireless sensor network environment. For various sensor network applications, security features are also to be a rising big issue more and more. If wireless sensor network supports a variety of security functions, more powerful devices and more energy are required. On the other hand, providing security feature and energy consumption together face a trade-off. Therefore, in this paper we propose a novel efficient security architecture in IEEE 802.15.4-based wireless sensor network called Hybrid Adaptive Security Framework. The goal of the proposed security framework is to provide hybrid adaptive security suites to each packet according to various WSN considerations.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"33 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128599074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Quantum Cryptography for Wireless Network Communications 无线网络通信的量子密码学
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800604
Xu Huang, S. Wijesekera, D. Sharma
{"title":"Quantum Cryptography for Wireless Network Communications","authors":"Xu Huang, S. Wijesekera, D. Sharma","doi":"10.1109/ISWPC.2009.4800604","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800604","url":null,"abstract":"It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results [1], are as follows: (a) We shall show how QKD can be used in IEEE 802.11 wireless networks to securely distribute the keys. (b) We shall introduce a method that take the advantage of mutual authentication features offered by some EAP variants of 802.1X Port-Based Network Access Control. (c) Finally, we present a new code called Quantum Message Integrity Code (Q-MIC) which provides mutual authentication between the two communication parties and its implementation","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigation of the LO Phase-Noise Effect and RF System Simulation for A 60-GHz Wireless Non-Contact Human Vital-Signal Detection System 60 ghz无线非接触式人体生命信号检测系统的相位噪声效应研究及射频系统仿真
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800588
P.-H. Lien, Fu-Lin Lin, H. Chuang
{"title":"Investigation of the LO Phase-Noise Effect and RF System Simulation for A 60-GHz Wireless Non-Contact Human Vital-Signal Detection System","authors":"P.-H. Lien, Fu-Lin Lin, H. Chuang","doi":"10.1109/ISWPC.2009.4800588","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800588","url":null,"abstract":"A detailed RF modeling and analysis for the effect of the phase noise of the local oscillator (LO) on a 60-GHz wireless non-contact human vital-signal detection system has been developed. To model the effect of the LO phase noise on the remote detecting estimation of the desired breathing and heartbeat signals around 1 Hz, the Lorentzian spectrum is applied for the RF system simulation of detection process. The simulation uses the root-MUSIC algorithm to calculate the frequency error ratios of the estimated heartbeat and breathing signals by the detection system. From the simulation results, it is found that root-MUSIC method is robust to analyze the effects of different phase noises on the non-contact vital-signal detection. The simulation result will be very useful for the RF design specifications of the wireless non-contact human vital-signal detection system.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PlaceSense: A Tool for Sensing Communities PlaceSense:一个感知社区的工具
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800601
Tuan A. Nguyen, S. Loke, T. Torabi, Hongen Lu
{"title":"PlaceSense: A Tool for Sensing Communities","authors":"Tuan A. Nguyen, S. Loke, T. Torabi, Hongen Lu","doi":"10.1109/ISWPC.2009.4800601","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800601","url":null,"abstract":"One challenge in the context-aware environment is to detect users' presence in a natural way and to process such information in order to provide suitable services for users. This paper introduces PlaceSense, an application using bluetooth technology, building on top of the Place-based Virtual Community architecture that can detect users presence for triggering services automatically. The paper also discusses the different use-cases of bluetooth technology for community sensing.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Comparative Analysis on the Signaling Load of Proxy Mobile IPv6 and Hierarchical Mobile IPv6 代理移动IPv6和分层移动IPv6信令负荷的比较分析
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800551
Myung-Kyu Yi, Jin-Woo Choi, Young-Kyu Yang
{"title":"A Comparative Analysis on the Signaling Load of Proxy Mobile IPv6 and Hierarchical Mobile IPv6","authors":"Myung-Kyu Yi, Jin-Woo Choi, Young-Kyu Yang","doi":"10.1109/ISWPC.2009.4800551","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800551","url":null,"abstract":"In this paper, we investigate the performance of the proxy mobile IPv6 and compare it with that of the hierarchical mobile IPv6. It is well known that performance of proxy mobile IPv6 is better than that of hierarchical mobile IPv6. For the more detailed performance analysis, we propose an analytic mobility model based on the random walk to take into account various mobility conditions. Based on the analytic models, we formulate the location management cost and handoff management cost. Then, we analyze the performance of the proxy mobile IPv6 and hierarchical mobile IPv6, respectively. The numerical results show that the proxy mobile IPv6 can has superior performance to hierarchical mobile IPv6 by reducing the latencies for location update and handoff.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Doppler Frequency Offset Estimation in OFDM systems OFDM系统中的多普勒频偏估计
2009 4th International Symposium on Wireless Pervasive Computing Pub Date : 2009-02-11 DOI: 10.1109/ISWPC.2009.4800579
Hyungu Hwang, Hyoungjun Park
{"title":"Doppler Frequency Offset Estimation in OFDM systems","authors":"Hyungu Hwang, Hyoungjun Park","doi":"10.1109/ISWPC.2009.4800579","DOIUrl":"https://doi.org/10.1109/ISWPC.2009.4800579","url":null,"abstract":"This paper presents frequency offset estimation algorithm in wireless OFDM cellular system such as 3G-LTE [1]. We first analyze the method of frequency offset estimation in general OFDM system. The analysis will show that the value of frequency offset estimation in cell boundary is inaccurate. Because doppler frequencies of signals transmitted from different base stations are different, the error of frequency offset estimation value is generated. We show how proposed algorithm can reduce the error of frequency offset estimation. Results of simulation show that the utilization of proposed algorithm can reduce the error of frequency offset estimation considerably. Proposed frequency offset estimation algorithm can increase overall system capacity because of performance improvement in cell boundary. Especially, 16-QAM or 64-QAM modulations for high data rate transmission is extremely sensitive to frequency offset, therefore proposed algorithm increases channel capacity for user in cell boundary.","PeriodicalId":383593,"journal":{"name":"2009 4th International Symposium on Wireless Pervasive Computing","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131589833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信