{"title":"Wireless Sensor Networks Energy Optimization Using User Location Information in Smart Homes","authors":"Harri Pensas, Miika Valtonen, J. Vanhala","doi":"10.1109/BWCCA.2011.55","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.55","url":null,"abstract":"Wireless sensor networks have received increased interest in different applications, including smart homes. One of the most important aspects of these networks is the energy consumption, which plays a crucial role in the usefulness of the implementations. In this paper, a new method for decreasing energy consumption is introduced. The method, called Location Based Latency Control (LBLC), will take advantage of the location information of the user in a smart home environment in order to optimize the energy-latency tradeoff present in many networks. The new method is tested by simulation based on power consumption measurements and location data gathered from a living test in actual smart home environment. The results show that using location information as a means of controlling the network parameters provides a useful and promising method in decreasing network energy consumption without sacrificing usability of the connected devices.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New TCP Control Method for Guaranteeing Throughput over High Speed Satellite Links","authors":"Hiroyasu Obata, Kazuya Tamehiro, K. Ishida","doi":"10.1109/BWCCA.2011.31","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.31","url":null,"abstract":"By launching WINDS (Wideband Inter Networking engineering test and Demonstration Satellite), the speed of satellite link has become larger such as that of terrestrial links. The experiment of ``Super Hi-Vision definition TV\" has been studied over WINDS. Thus, it is expected that the use of such multimedia application over the satellite Internet will become larger. It is necessary for such applications to guarantee the throughput. QoS-TCP has been proposed to guarantee throughput by using a transmission control protocol. The traditional QoS-TCPs can obtain the required throughput by adjusting sending rate in response to the demand of application. However, the retransmission control of traditional QoS-TCPs is same as a normal TCP. If these methods are used over the satellite links which have large-bandwidth, long delay and packet losses, it is possible that these methods can not obtain the required throughput when packet losses occur. In this paper, we propose a control method for QoS-TCP, which moderates degradation of congestion window and accelerates the data transmission speed when packet losses occur. As a result, it is expected that the proposal can improve the QoS-TCP performance for guaranteeing the throughput. Simulation results show the proposal can obtain better throughput than the existing method over the typical satellite link which has bit error and coexists the background flows.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116663904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Policy Based Link and Route Selection Methods for Never Die Network","authors":"Noriki Uchida, Kazuo Takahata, Y. Shibata","doi":"10.1109/BWCCA.2011.30","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.30","url":null,"abstract":"A massive 9.0 magnitude earthquake hit the Pacific Ocean nearby Northeastern Japan causing damage On March 11, 2011. Recorded as 9.0 on the Richter scale, it was the most powerful quake ever to hit the country and caused severe damages over northern parts of Japan. This paper is discussed about the quick reports of communication traffic analysis and connectivity in the disaster area where electrity and network connection was survived. Then, our proposed Never Die Network in Disaster Information System is discussed with considering user policy from the reports. Just After the earthquake, network conditions were not enough to held multimedia communication because many network machines were damaged. However, it was very important to keep even minimal network connection to use Disaster Information System such as live, shelters, life line, and so on can be used. Our proposed Disaster Information System needs such a robust Never Die Network which will be provided the least transmission service even after severe disaster. Thus, we introduce Satellite System for optimal transmission control method in Cognitive Wireless Network in order to consider with severe disaster. First, as our previous study considering user policy, proper wireless link and route selection is held by Extend AHP and Extend AODV with Min-Max AHP value methods for optimal transmission control in Cognitive Wireless Network. Then, it is discussed about additional functions using satellite system in NDN. In the simulation, ns2 are used for the computational results to the effectiveness of the suggested transmission methods.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area","authors":"F. Palmieri, S. Ricciardi, Ugo Fiore","doi":"10.1109/BWCCA.2011.66","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.66","url":null,"abstract":"In the green Information and Communication Society (ICS), new form of Denial of Service (DoS) attacks may be put in place: exploiting the computational and storage resources of datacenters with the aim of consuming as much energy as possible, causing detrimental effects, from high costs in the energy bill, to penalization for exceeding the agreed quantity of CO2 emissions, up to complete denial of service due to power outages. To the best of our knowledge, this is the first paper which investigates the impacts of network-based DoS attacks under the energy consumption perspective. We analyzed different types of such attacks with their impacts on the energy consumption, and showed that current energy-aware technologies may provide attackers with great opportunities for raising the target facility energy consumption and consequently its green house gases (GHG) emissions and costs.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133093842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Online Evolutionary Programming Method for Parameters of Wireless Networks","authors":"Jason B. Ernst, J. A. Brown","doi":"10.1109/BWCCA.2011.83","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.83","url":null,"abstract":"Wireless networks operate in rapidly changing environments. Often parameters for particular algorithms are set with particular environments in mind, or assume certain conditions. When conditions change from interference, user mobility, handover and changing demand, the network may be unable to cope. To solve some of these problems we propose an online evolutionary approach to parameter computation. The online approach allows for quick computation of new parameter values while still retaining some history of past actions. We apply this approach to mixed bias scheduling and demonstrate that the approach works well when compared with existing mixed bias approaches and IEEE 802.11 DCF. The evolutionary programming approach achieves a significantly reduced end-to-end delay while maintaining comparable packet delivery ratio when evaluated using simulation experiments.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121680685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments","authors":"L. Batyuk, S. Çamtepe, S. Albayrak","doi":"10.1109/BWCCA.2011.33","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.33","url":null,"abstract":"In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce emph{QR-Auth}, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128424797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pietro Albano, Aniello Castiglione, G. Cattaneo, A. D. Santis
{"title":"A Novel Anti-forensics Technique for the Android OS","authors":"Pietro Albano, Aniello Castiglione, G. Cattaneo, A. D. Santis","doi":"10.1109/BWCCA.2011.62","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.62","url":null,"abstract":"In recent years traditional mobile-phones, used only to make calls and send text messages, have evolved into even more versatile and powerful devices (smart phones, tablets, etc.). These devices use a NAND flash memory type to store data, due to it being a memory that has been optimized for the fast updating of data. These flash memory drives usually contain sensitive data that could be a possible danger to the user's privacy. This paper proposes a new anti-forensics technique for mobile devices with the Android OS. The technique makes it possible to modify and erase, securely and selectively, the digital evidence on an Android device without having to use any cryptographic primitives or make any file system changes. While the use of cryptographic primitives or changes to the file system create considerable suspicion in a forensic analysis, the proposed technique uses simple software tools commonly used in *nix-like OSes such as the Android OS.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}