L. Santhanam, D. Nandiraju, N. Nandiraju, D. Agrawal
{"title":"Active Cache Based Defense against DoS Attacks in Wireless Mesh Network","authors":"L. Santhanam, D. Nandiraju, N. Nandiraju, D. Agrawal","doi":"10.1109/ISWPC.2007.342640","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342640","url":null,"abstract":"Wireless mesh network (WMN) is evolving to be a new paradigm for wireless Internet connectivity as it obviates the need for wired infrastructure at every access point (AP) a.k.a mesh router (MR). The MRs collaboratively forward the traffic towards the Internet gateway (IGW). The self-configurable architecture of MRs paves way for malicious intruders to conduct a denial-of-service attack (DoS) on the MRs by flooding the network with a large volume of traffic; thus rendering the system inaccessible to the real users. In this paper, we present a cache based defense at the MRs to identify flooding style DoS attacks. We use a most frequently used cache mechanism to identify such flows and raise an early alert to curb them. We effectively avert any performance degradation by dropping the identified attack flows along the forwarding routers. Simulation results indicate that our scheme offers an active line of defense against DoS attacks","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Engelke, A. Rossholm, H. Zepernick, B. Lovstrom
{"title":"Quality Assessment of an Adaptive Filter for Artifact Reduction in Mobile Video Sequences","authors":"U. Engelke, A. Rossholm, H. Zepernick, B. Lovstrom","doi":"10.1109/ISWPC.2007.342630","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342630","url":null,"abstract":"In this paper, we examine an adaptive deblocking deringing filter for mobile video sequences in H.263 format. The considered filter has been designed with reference to the constraints of computational complexity and working memory of mobile terminals. The post filter suggested by the International Telecommunications Union (ITU) in Recommendation H.263 App. III is also included as a reference. Given that fidelity metrics such as the peak signal-to-noise ratio (PSNR) do not necessarily correlate well with video quality as experienced by the user, we consider in this paper objective quality metrics that can incorporate knowledge about the user's perception into the quality assessment. Guidelines for choosing filter parameters in relation to user-perceived video quality are obtained from the numerical results","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126056897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Chun, Joonyeop Lee, Ji-hyuk Kim, H. Kim, Kwang-Jun Yoon, Young-il Kim, I. Song
{"title":"A WLAN/WMAN Dual Mode Transceiver System for Indoor/Outdoor Application","authors":"K. Chun, Joonyeop Lee, Ji-hyuk Kim, H. Kim, Kwang-Jun Yoon, Young-il Kim, I. Song","doi":"10.1109/ISWPC.2007.342592","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342592","url":null,"abstract":"WLAN (IEEE 802.11a)/VMAN (IEEE 802.16a) dual mode transceiver chip has been proposed, designed and fabricated. Transceiver RF IC chip with packaged size of 6 mm*6 mm was fabricated using 0.25 um SiGe BiCMOS process. Power amplifier and PLL/VCO chip were fabricated using the same process. Ceramic front-end filter were also fabricated for WLAN/WMAN frequencies. To make compact transceiver system, these chips was mounted on 2 cm*2 cm double side PCB. The full system has been tested with external ADC/DAC and baseband modem. The measured results show that fabricated transceiver system meets the requirements for WLAN/WMAN standards","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121724368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple-Objective Metric for Placing Multiple Base Stations in Wireless Sensor Networks","authors":"Soo Kim, Jeong-Gil Ko, Jongwon Yoon, Heejo Lee","doi":"10.1109/ISWPC.2007.342679","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342679","url":null,"abstract":"The placement of base stations in wireless sensor networks affects the coverage of sensor nodes, the tolerance against faults or attacks, the energy consumption and the congestion from communication. However, previous studies mostly focus on the placement of base stations to improve a partial property, not considering all of them. In this paper we propose multiple-objective metric (MOM), which reflects four different metrics for base station placement in wireless sensor networks. First, the ratio of sensor nodes which can communicate with a base station via either single-hop or multi-hop represents the coverage of sensor nodes. Second, the average ratio of sensor nodes after the failure of base stations represents the fault tolerance of a network. Third, the average distance between sensor nodes and their nearest base station represents the energy consumption of a network. Fourth, the standard deviation of the degree of base stations represents the average delay of a network due to congestion. We show that placing multiple base stations using our proposed MOM can fairly increase various properties of wireless sensor networks","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121480979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeonggil Ko, Ji-Hun Ha, B. Park, Seung-goo Lee, Hak-Lim Ko
{"title":"Virtual Mobile Backbones for Wireless Ad-hoc Networks with the support of Directional Array Antennas","authors":"Jeonggil Ko, Ji-Hun Ha, B. Park, Seung-goo Lee, Hak-Lim Ko","doi":"10.1109/ISWPC.2007.342621","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342621","url":null,"abstract":"Ad-hoc network techniques are in the center of attention to many scientists and engineers in the fact that wireless ad-hoc networks will bring high speed communication to the users with no given fixed infrastructure such as the base station or the AP (access point). However, the infrastructure-less topology brings new limitations such as small connectivity of nodes in the network caused by the short communication range of nodes. In this work, to solve these problems we propose the adaptation of directional array antennas in a virtual mobile backbone ad-hoc network. This adaptation can partially solve the complexity problem by activating directional array antennas only at backbone nodes and by performing beamforming techniques it will bring better connectivity of the nodes in the network resulting higher throughput performance","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Study of a Secure Routing Protocol in Wireless Mobile Ad Hoc Networks","authors":"M. Alsaadi, Y. Qian","doi":"10.1109/ISWPC.2007.342641","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342641","url":null,"abstract":"Mobile ad hoc network (MANET) is a special type of mobile wireless network where a collection of mobile devices form a temporary network without any aid of an established infrastructure. Security issues put special challenges in MANET routing protocol design. This paper focuses on the performance study for security of a MANET routing protocol, and particularly on the improvement of the security for dynamic source routing protocol (DSR). We improve the security of routing for the existing DSR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values, ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taehong Kim, Noseong Park, P. K. Chong, Jongwoo Sung, Daeyoung Kim
{"title":"Distributed Low Power Scheduling in Wireless Sensor Networks","authors":"Taehong Kim, Noseong Park, P. K. Chong, Jongwoo Sung, Daeyoung Kim","doi":"10.1109/ISWPC.2007.342613","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342613","url":null,"abstract":"Wireless sensor networks are becoming more and more common in the ubiquitous computing era. The applications of sensor networks are diverse and they are employed in areas such as smart homes, military, ITS, fire monitoring, factory automation, and so on. However, sensor networks are generally battery powered and thus, low power consumption is required for prolonged use. In this paper, we propose a distributed low power scheduling algorithm for sensor nodes to determine its active time slots in a TDMA mechanism working on top of a slotted CSMA network. The performance evaluation shows that an extremely small duty cycle is achieved by the proposed algorithm with a tradeoff in data delay in a sensor network application","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Lifetime Maximization Strategies for Wireless Sensor Networks","authors":"I. Slama, B. Jouaber, D. Zeghlache","doi":"10.1109/ISWPC.2007.342579","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342579","url":null,"abstract":"Energy consumption optimization constitutes one of the main challenges in wireless sensor networks. Most of the power based routing strategies proposed in the literature are based on global power consumption optimization rather than maximizing the network lifetime. In this paper, we propose an adaptive routing strategy that maximizes the lifetime of the sensor network, where optimal routes are selected in order to delay, as long as possible, the first energy run out among sensor nodes. The proposed routing strategy also takes into account both the reception and the transmission energy dissipations. Moreover, in order to adapt to the changes that may occur in the network topology or characteristics, we propose a global adaptive framework that dynamically reconfigures routes according to the current network state. The proposed strategy is modelled and simulation results are presented","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Lunttila, J. Lindholm, K. Pajukoski, E. Tiirola, A. Toskala
{"title":"EUTRAN Uplink Performance","authors":"T. Lunttila, J. Lindholm, K. Pajukoski, E. Tiirola, A. Toskala","doi":"10.1109/ISWPC.2007.342658","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342658","url":null,"abstract":"Alongside with on-going further WCDMA development, work on evolved universal terrestrial radio access network (EUTRAN), also known as long term evolution (LTE), has been initiated in 3GPP. The objective of EUTRAN is to develop a framework for the evolution of the 3GPP radio-access technology towards wider bandwidth, lower latency and packet-optimized radio-access technology with peak data rate capability up to 100 Mbps. For the uplink direction, single carrier-FDMA (SC-FDMA) has been chosen as the multiple access technology. This paper introduces the uplink technology, the current state of progress in 3GPP as well as expected schedule for actual specification availability and describes a couple of key features, channel dependent frequency domain scheduling and multi-user MIMO in more detail. System performance results for channel dependent frequency domain scheduling are presented as well","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125037259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of IEEE 802.11e Access Class Parameters with Cross-layer Approach","authors":"Ivano Alocci, Giovanni Giambene, Y. Koucheryavy","doi":"10.1109/ISWPC.2007.342589","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342589","url":null,"abstract":"The aim of this paper is to analyze the performance of diverse applications in a wireless scenario based on the IEEE 802.11e standard. In particular, TCP-based traffic (several TCP versions was be used, such as: TCP NewReno, SACK, and Westwood+) and UDP-based traffic was considered referring to FTP download and VoIP applications, respectively. Tests carried out in the ns-2 environment have permitted to evaluate quality of service issues and the cross-layer impact on the transport layer due to EDCA parameters. The interest is here on the selection of the contention window sizes for different IEEE 802.11e access classes in order to guarantee a good performance for both TCP-based and UDP-based traffic flows.","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}