The International Conference on Information Networking 2014 (ICOIN2014)最新文献

筛选
英文 中文
A security mechanism of Smart Grid AMI network through smart device mutual authentication 一种基于智能设备相互认证的智能电网AMI网络安全机制
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799750
Sangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin
{"title":"A security mechanism of Smart Grid AMI network through smart device mutual authentication","authors":"Sangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin","doi":"10.1109/ICOIN.2014.6799750","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799750","url":null,"abstract":"AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID-based authentication mechanism does not offer mutual authentication between User Device and Smart Meter. PKI (Public Key Infrastructure) in Smart Grid gives a guarantee for security, but the number of exchanged data to generate certificate for all Smart Devices is concerned. This paper proposes to couple ID-based authentication and PKI mechanism, which offers mutual authentication between Smart Devices. This proposed mechanism reduces the number of message exchanges and ultimately provides secure communication environments to Smart Devices.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Confidential aggregation for wireless transmissions 用于无线传输的机密聚合
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799711
Soonhwa Sung
{"title":"Confidential aggregation for wireless transmissions","authors":"Soonhwa Sung","doi":"10.1109/ICOIN.2014.6799711","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799711","url":null,"abstract":"Wireless sensor network would like to act a secure data aggregation in a cluster. In the previous scheme, there was no efficient data aggregation considering encrypted-data aggregation in multi-layer cluster environment. More specifically, the scheme doesn't provide multi-layer cluster environment due to one-hop to the base station and it pre-installs keys for verification and data aggregation in the Cluster Head before deployment, so it limits the flexibility of system deployment and aggregation. Besides, it doesn't support dynamic key management to bring more flexibility in data aggregation. Therefore, this paper proposes data confidentiality for wireless sensor transmission with three layers. Three layers which are composed of public, Sensor Key Translation, and confidential layers operate to solve these problems. The paper extends privacy homomorphism functions to support dynamic data aggregation and the sensors can be moved to another cluster using three layers.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123340549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel scheme for preventing Out-Of-Order Packets in fast handover for Proxy Mobile IPv6 一种防止移动IPv6代理快速切换中乱序包的新方案
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799717
Anh Khuong Quoc, Dongsoo S. Kim, Hyunseung Choo
{"title":"A novel scheme for preventing Out-Of-Order Packets in fast handover for Proxy Mobile IPv6","authors":"Anh Khuong Quoc, Dongsoo S. Kim, Hyunseung Choo","doi":"10.1109/ICOIN.2014.6799717","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799717","url":null,"abstract":"Fast handover for Proxy Mobile IPv6 (FPMIPv6), a protocol described in RFC 5949, is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in the testbed, we reveal the Out-of-Order Packet (OoOP) problem. We propose a new scheme using last packet marker and buffering to handle the OoOP problem in FPMIPv6, since the problem significantly affects QoS of the network and performance of the Mobile Node (MN). The cause of this problem is the existence of two paths for data transmitted from Correspondent Node (CN) to MN in FPMIPv6. The new Mobility Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to MN in chronological order, using the last packet marker to notify the end of data delivery in the old path and the buffering for holding the data delivered in the new path. We implement both the proposed and FPMIPv6 schemes in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. Performance evaluation reveals the proposed scheme can handle the OoOP problem efficiently.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123407270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proposal of flexible time-slot assignment algorithm for sub-λ switching network 子λ交换网络灵活时隙分配算法的提出
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799487
K. Okamoto, Tatsuro Takahashi
{"title":"Proposal of flexible time-slot assignment algorithm for sub-λ switching network","authors":"K. Okamoto, Tatsuro Takahashi","doi":"10.1109/ICOIN.2014.6799487","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799487","url":null,"abstract":"Current backbone networks using the optical cross-connect switches of λ path have the problem of granularity. To solve this problem, time synchronous optical switch networks have been studied to use as wide-area networks. In this network, all traffic are transmitted by the sub-λ path units of time to split the λ path. It is essential to solve the time-slot assignment problem, which has been studied conventionally for improving network capacity utilization in the time synchronous network. Nevertheless, the solution in precise conditions considering the time-slot structure and the propagation delay has not been addressed in previous work. Therefore, we study time-slot assignment algorithm considering the time-slot structure including transmission method. Under the realistic model that has a continuous propagation delay between two nodes, we evaluated proposed transmission method “flexible time-slot transmission method”. We confirmed by simulation results in the realistic conditions that it is possible to make good use of the network capacity by proposed transmission method.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116846045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data center infrastructure management WLAN networks for monitoring and controlling systems 数据中心基础设施管理用于监控系统的WLAN网络
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799696
M. Wiboonrat
{"title":"Data center infrastructure management WLAN networks for monitoring and controlling systems","authors":"M. Wiboonrat","doi":"10.1109/ICOIN.2014.6799696","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799696","url":null,"abstract":"Constraints of space, network, power, and cooling, along with the vast complexity of managing a large data center, have given ascend to a new principle of tools with integrated processes called data center infrastructure management (DCIM). DCIM model provides data center operating provision in term of system connectivity and interrelationship among system operations to support data center operations managers. The benefits of wireless technology are reduced investment subject to time to implement, cost of installation labor and material, and flexibility of mobility. Moreover, WLAN and VLAN are deployed to eliminate the limitations of cabling infrastructure e.g. fast installation, less costs per switching port and cable wiring, limited working space, reduce risk during installation, etc. This model can also reduce investment cabling and network operating costs, control energy costs, improve energy efficiency, and increase operational efficiency.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121930219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance analysis of Nakagami-m MIMO channel in the presence of multiple keyhole 多锁孔存在下Nakagami-m MIMO信道性能分析
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799491
Md. Muzahidul Islam, Md. Razibul Haque, Md. Rezaul Islam, M. Mostafa
{"title":"Performance analysis of Nakagami-m MIMO channel in the presence of multiple keyhole","authors":"Md. Muzahidul Islam, Md. Razibul Haque, Md. Rezaul Islam, M. Mostafa","doi":"10.1109/ICOIN.2014.6799491","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799491","url":null,"abstract":"In this contribution, we analyze the average symbol error rate (SER) of space-time block coded (STBC) multiple-input multiple-output (MIMO) system over Nakagami-m fading channel with M-PSK constellation in the presence of multiple keyholes. We derived the expression of channel transmission matrix which was further statistically analyzed to find the probability density function (PDF) of instantaneous signal to noise ratio (SNR) for the channel containing multiple keyholes between it's source and destination end. By performing (p-1)-fold convolution of the individual PDFs of instantaneous SNRs we derived the overall PDF of the multiple keyhole channel, which was used to derive the expression for average SER of the system. Furthermore, we examined the effect of multiple keyholes on the system performance. Result shows that with the increase of number of keyholes, a significant improvement in the system performance takes place. For a given number of keyholes, by increasing the number of receive antennas further improvement in the system performance is observed.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing-based and location-aware service discovery in Mobile Ad-hoc Networks 移动自组织网络中基于路由和位置感知的服务发现
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799474
Sebastian Schellenberg, Amirhossein Saliminia, S. Krug, J. Seitz, Thomas Finke, Juergen Schroeder
{"title":"Routing-based and location-aware service discovery in Mobile Ad-hoc Networks","authors":"Sebastian Schellenberg, Amirhossein Saliminia, S. Krug, J. Seitz, Thomas Finke, Juergen Schroeder","doi":"10.1109/ICOIN.2014.6799474","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799474","url":null,"abstract":"In disaster scenarios, a stable and reliable communication is essential for coordinating rescue operations. As the communication infrastructure could be hit, e.g. by earthquakes or hurricanes, mobile ad hoc networks (MANETs) can be used for connection establishment. As such networks should be decentralized to increase robustness, some usual services are no longer available. In our previous publications, we presented our name resolution framework based on an adaptive routing system. In this paper, we show a service discovery mechanism based on this system.We show, how this mechanism can easily be improved with the use of location information, which is an important issue for service availability.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software aging trend analysis of server virtualized system 服务器虚拟化系统软件老化趋势分析
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799478
B. Mohan, G. R. M. Reddy
{"title":"Software aging trend analysis of server virtualized system","authors":"B. Mohan, G. R. M. Reddy","doi":"10.1109/ICOIN.2014.6799478","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799478","url":null,"abstract":"It is well known that software systems suffer from performance degradation due to resource shrinking and this phenomenon is referred to as Software Aging. Long running software systems tend to show degradation in performance due to exhaustion of operating systems resources, data corruption and numerical error accumulation. The primary objective of the paper is to establish the aging trend in the server virtualized system. It establishes the aging trend by showing that the average response time decreases while total available physical memory decreases. Linear regression model has been used to study the aging trend.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128132036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel reactance domain MUSIC algorithm for direction of arrival estimation using 13-element ESPAR antennas 一种新的13元ESPAR天线到达方向估计的电抗域MUSIC算法
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799492
Xin Wang, Bong-Jun Kim, H. Ryu
{"title":"A novel reactance domain MUSIC algorithm for direction of arrival estimation using 13-element ESPAR antennas","authors":"Xin Wang, Bong-Jun Kim, H. Ryu","doi":"10.1109/ICOIN.2014.6799492","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799492","url":null,"abstract":"Electronically steerable parasitic array radiator (ESPAR) antenna is well known for its low-power consumption, small-size antenna. In this paper, a novel fourth-order MUSIC algorithm using a 13-element ESPAR antennas for direction of arrival (DOA) estimation is proposed based on processing the covariance matrix of the array output signals. Unlike the conventional MUSIC algorithm which is an effective method for DOA estimation, the main motivation of the fourth-order MUSIC algorithm is that it is insensitive to additive Gaussian noise regardless of whether it is white or colored so it can improve the precision of the DOA estimation. By comparing with the conventional algorithm, our proposed algorithm can obtain more than 45dB gain under SNR=10dB, which can obviously show an outstanding performance improvement. Finally, computer simulation results show that the novel algorithm can resolve up to one impinging signal with less than 0.15° under SNR=0dB and provide an estimation with less than 0.6° under SNR=5dB for two impinging signals coming from different angles.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126547452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of hierarchical routing protocol for heterogeneous airborne ad hoc networks 异构机载自组网分层路由协议设计
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799683
Chung-Jae Lee, SeokYoon Kang, Ki-Il Kim
{"title":"Design of hierarchical routing protocol for heterogeneous airborne ad hoc networks","authors":"Chung-Jae Lee, SeokYoon Kang, Ki-Il Kim","doi":"10.1109/ICOIN.2014.6799683","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799683","url":null,"abstract":"Due to recent research interests in airborne ad hoc networks, many research works have been conducted in each layer by developing communication protocols which take into unique properties of node (aircraft) as well as operating environments account. Among them, as the research efforts in network layer, several routing protocols have been proposed to improve packet delivery ratio even though a node moves faster than one in existing ad hoc networks. Related to routing protocol, as proved in many previous research works, hierarchical routing protocol can be considered as appropriate approach in airborne ad hoc networks due to its stability against dynamic change on topology. To meet above demand, in this paper, we present how to form two level hierarchies for heterogeneous networks by extending current geographical routing protocol. Furthermore, the proposed scheme introduces how to improve the packet delivery ratio by applying DTN (Delay Tolerant Networks) routing protocol adaptively for network partition. Simulation results are given to prove suitability of proposed protocol in heterogeneous airborne ad hoc networks.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121968844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信