2011 International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Wireless Sensor Networks Energy Optimization Using User Location Information in Smart Homes 智能家居中使用用户位置信息的无线传感器网络能量优化
Harri Pensas, Miika Valtonen, J. Vanhala
{"title":"Wireless Sensor Networks Energy Optimization Using User Location Information in Smart Homes","authors":"Harri Pensas, Miika Valtonen, J. Vanhala","doi":"10.1109/BWCCA.2011.55","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.55","url":null,"abstract":"Wireless sensor networks have received increased interest in different applications, including smart homes. One of the most important aspects of these networks is the energy consumption, which plays a crucial role in the usefulness of the implementations. In this paper, a new method for decreasing energy consumption is introduced. The method, called Location Based Latency Control (LBLC), will take advantage of the location information of the user in a smart home environment in order to optimize the energy-latency tradeoff present in many networks. The new method is tested by simulation based on power consumption measurements and location data gathered from a living test in actual smart home environment. The results show that using location information as a means of controlling the network parameters provides a useful and promising method in decreasing network energy consumption without sacrificing usability of the connected devices.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New TCP Control Method for Guaranteeing Throughput over High Speed Satellite Links 一种保证高速卫星链路吞吐量的TCP控制新方法
Hiroyasu Obata, Kazuya Tamehiro, K. Ishida
{"title":"A New TCP Control Method for Guaranteeing Throughput over High Speed Satellite Links","authors":"Hiroyasu Obata, Kazuya Tamehiro, K. Ishida","doi":"10.1109/BWCCA.2011.31","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.31","url":null,"abstract":"By launching WINDS (Wideband Inter Networking engineering test and Demonstration Satellite), the speed of satellite link has become larger such as that of terrestrial links. The experiment of ``Super Hi-Vision definition TV\" has been studied over WINDS. Thus, it is expected that the use of such multimedia application over the satellite Internet will become larger. It is necessary for such applications to guarantee the throughput. QoS-TCP has been proposed to guarantee throughput by using a transmission control protocol. The traditional QoS-TCPs can obtain the required throughput by adjusting sending rate in response to the demand of application. However, the retransmission control of traditional QoS-TCPs is same as a normal TCP. If these methods are used over the satellite links which have large-bandwidth, long delay and packet losses, it is possible that these methods can not obtain the required throughput when packet losses occur. In this paper, we propose a control method for QoS-TCP, which moderates degradation of congestion window and accelerates the data transmission speed when packet losses occur. As a result, it is expected that the proposal can improve the QoS-TCP performance for guaranteeing the throughput. Simulation results show the proposal can obtain better throughput than the existing method over the typical satellite link which has bit error and coexists the background flows.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116663904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Policy Based Link and Route Selection Methods for Never Die Network 基于用户策略的永不死网络选路方法
Noriki Uchida, Kazuo Takahata, Y. Shibata
{"title":"User Policy Based Link and Route Selection Methods for Never Die Network","authors":"Noriki Uchida, Kazuo Takahata, Y. Shibata","doi":"10.1109/BWCCA.2011.30","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.30","url":null,"abstract":"A massive 9.0 magnitude earthquake hit the Pacific Ocean nearby Northeastern Japan causing damage On March 11, 2011. Recorded as 9.0 on the Richter scale, it was the most powerful quake ever to hit the country and caused severe damages over northern parts of Japan. This paper is discussed about the quick reports of communication traffic analysis and connectivity in the disaster area where electrity and network connection was survived. Then, our proposed Never Die Network in Disaster Information System is discussed with considering user policy from the reports. Just After the earthquake, network conditions were not enough to held multimedia communication because many network machines were damaged. However, it was very important to keep even minimal network connection to use Disaster Information System such as live, shelters, life line, and so on can be used. Our proposed Disaster Information System needs such a robust Never Die Network which will be provided the least transmission service even after severe disaster. Thus, we introduce Satellite System for optimal transmission control method in Cognitive Wireless Network in order to consider with severe disaster. First, as our previous study considering user policy, proper wireless link and route selection is held by Extend AHP and Extend AODV with Min-Max AHP value methods for optimal transmission control in Cognitive Wireless Network. Then, it is discussed about additional functions using satellite system in NDN. In the simulation, ns2 are used for the computational results to the effectiveness of the suggested transmission methods.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area 能源消耗视角下基于网络的DoS攻击评估:未来绿色ICT领域的新安全问题
F. Palmieri, S. Ricciardi, Ugo Fiore
{"title":"Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area","authors":"F. Palmieri, S. Ricciardi, Ugo Fiore","doi":"10.1109/BWCCA.2011.66","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.66","url":null,"abstract":"In the green Information and Communication Society (ICS), new form of Denial of Service (DoS) attacks may be put in place: exploiting the computational and storage resources of datacenters with the aim of consuming as much energy as possible, causing detrimental effects, from high costs in the energy bill, to penalization for exceeding the agreed quantity of CO2 emissions, up to complete denial of service due to power outages. To the best of our knowledge, this is the first paper which investigates the impacts of network-based DoS attacks under the energy consumption perspective. We analyzed different types of such attacks with their impacts on the energy consumption, and showed that current energy-aware technologies may provide attackers with great opportunities for raising the target facility energy consumption and consequently its green house gases (GHG) emissions and costs.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133093842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An Online Evolutionary Programming Method for Parameters of Wireless Networks 无线网络参数的在线进化规划方法
Jason B. Ernst, J. A. Brown
{"title":"An Online Evolutionary Programming Method for Parameters of Wireless Networks","authors":"Jason B. Ernst, J. A. Brown","doi":"10.1109/BWCCA.2011.83","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.83","url":null,"abstract":"Wireless networks operate in rapidly changing environments. Often parameters for particular algorithms are set with particular environments in mind, or assume certain conditions. When conditions change from interference, user mobility, handover and changing demand, the network may be unable to cope. To solve some of these problems we propose an online evolutionary approach to parameter computation. The online approach allows for quick computation of new parameter values while still retaining some history of past actions. We apply this approach to mixed bias scheduling and demonstrate that the approach works well when compared with existing mixed bias approaches and IEEE 802.11 DCF. The evolutionary programming approach achieves a significantly reduced end-to-end delay while maintaining comparable packet delivery ratio when evaluated using simulation experiments.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121680685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments 普适计算环境下使用可视化侧通道的多设备密钥管理
L. Batyuk, S. Çamtepe, S. Albayrak
{"title":"Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments","authors":"L. Batyuk, S. Çamtepe, S. Albayrak","doi":"10.1109/BWCCA.2011.33","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.33","url":null,"abstract":"In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce emph{QR-Auth}, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128424797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Anti-forensics Technique for the Android OS 一种针对Android操作系统的新型反取证技术
Pietro Albano, Aniello Castiglione, G. Cattaneo, A. D. Santis
{"title":"A Novel Anti-forensics Technique for the Android OS","authors":"Pietro Albano, Aniello Castiglione, G. Cattaneo, A. D. Santis","doi":"10.1109/BWCCA.2011.62","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.62","url":null,"abstract":"In recent years traditional mobile-phones, used only to make calls and send text messages, have evolved into even more versatile and powerful devices (smart phones, tablets, etc.). These devices use a NAND flash memory type to store data, due to it being a memory that has been optimized for the fast updating of data. These flash memory drives usually contain sensitive data that could be a possible danger to the user's privacy. This paper proposes a new anti-forensics technique for mobile devices with the Android OS. The technique makes it possible to modify and erase, securely and selectively, the digital evidence on an Android device without having to use any cryptographic primitives or make any file system changes. While the use of cryptographic primitives or changes to the file system create considerable suspicion in a forensic analysis, the proposed technique uses simple software tools commonly used in *nix-like OSes such as the Android OS.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信