{"title":"A methodology to enhance media policing over IMS Networks","authors":"J. Sathyan, N. Unni","doi":"10.1109/ISWPC.2007.342665","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342665","url":null,"abstract":"The rapid spread of IP-based access technologies as well as the move towards core network convergence with IMS has led to an explosion in multimedia content delivery across packet networks. Although this transition has led to a much wider and richer service experience, there is also increased concern related to media protection and secure delivery of content that is sent over networks in digital form. There are many efforts ongoing to address this area of DRM in a converged world. The open mobile alliance has probably the most comprehensive approach to this with the recent release of the DRM V2.0 pre-release. Enhanced key management is the most powerful introduction in OMA DRM 2.0 which is used in the trust and security model providing authentication both at user equipment and the application server filling in the gaps of DRM 1.0. The main drawback is the assumption that all DRM agents on the user equipment are well-behaved. This paper proposes a novel method of enabling an added level of security and media protection before the media gets played by an application on the user equipment. This is addition to the current key management paradigm. The paper lays out the changes in network infrastructure, both on the client as well as server side, required to enable this. It addresses issues of scalability and performance that are required in a mass-deployed service provider based setup, and demonstrates how the proposed solution would not adversely affect these quality parameters","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Error weight distribution in MB-OFDM based UWB system with spreading","authors":"N. Panday, B. Natarajan","doi":"10.1109/ISWPC.2007.342584","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342584","url":null,"abstract":"In this paper we evaluate various spreading transforms and their ability to exploit diversity in multi band OFDM based ultra wide band system. The ability of a spreading code to exploit diversity is measured in terms of error weight distribution. Specifically, we consider Hadamard, rotated Hadamard, CI codes and orthogonal Viterbi spreading transforms in this work and present their error weight distribution with QPSK and BPSK modulation. Furthermore, we demonstrate the performance gains achievable by these codes in QPSK and BPSK modulated multi band OFDM based UWB system. In summary, we verify the claim that error weight distribution plays an important role in determining the spreading transform to use","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultra Wideband (UWB) Interference on UMTS Receivers","authors":"G. Nader, A. Annamalai","doi":"10.1109/ISWPC.2007.342582","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342582","url":null,"abstract":"This paper discusses the effects of impulse radio ultra wideband (UWB) interference on narrowband radio systems. It presents the fundamental mathematical modeling of the interaction between the UWB signal and the narrowband victim receiver. Further, as an example, it demonstrates the effects of UWB interference on a UMTS receiver through simulations, showing how the receiver response varies as the pulse repetition frequency (PRF) of the UWB signal varies. We show that depending on the pulse rate, signal dithering and receiver demodulation bandwidth, UWB interference can be modeled as additive white Gaussian noise (AWGN)","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSS Self-calibration Protocol for WSN Localization","authors":"Jihoon Kang, Daeyoung Kim, Youngsoo Kim","doi":"10.1109/ISWPC.2007.342597","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342597","url":null,"abstract":"In wireless sensor network (WSN) localization system, received signal strength (RSS) is one of the simplest ranging methods. However, in real situation, a RSS is affected by some errors which are caused by multi-path channel and dynamic environment. In this paper, we propose RSS self-calibration protocol to attack the errors. The RSS self-calibration protocol can adopt the calibration parameters according to environment as time goes by","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122205622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Bonizzi, L. Sedoni, D. Sganzerla, U. Manzoli, P. Pavan
{"title":"A wearable IEEE 802.15.4 system for logistics scenarios","authors":"F. Bonizzi, L. Sedoni, D. Sganzerla, U. Manzoli, P. Pavan","doi":"10.1109/ISWPC.2007.342672","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342672","url":null,"abstract":"We present a novel and innovative wireless embedded system for logistic applications: it is a prototype of a portable appliance to manage operations in production activity. The system is based on a wearable device which is able to read products codes and allows the system to guide users through the different phases of warehouse's everyday life; by means of IEEE 802.15.4 standard - on the ISM 2.4 GHz band - the system can wirelessly transfer data, service and control messages and commands to and from its coupled management server. The system is addressed to retail markets, pharmacies, porterage and logistic activities and it allows the user to work more efficiently and with a mobile terminal that is more ergonomic: from intensive picking to packing, from load of goods from lines to lists and warehouse checks","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valli A. RamMohan, H. Sethu, Madhusudan Hosaagrahara, K. Dandekar
{"title":"A New Protocol to Mitigate the Unheard RTS/CTS Problem in Networks with Switched Beam Antennas","authors":"Valli A. RamMohan, H. Sethu, Madhusudan Hosaagrahara, K. Dandekar","doi":"10.1109/ISWPC.2007.342587","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342587","url":null,"abstract":"Wireless networks with the capability for directional transmissions using switched beam antennas have increasingly been used to increase the coverage area of nodes as well as to improve spatial reuse. This paper is concerned with the unheard RTS/CTS problem that arises due to the use of directional transmissions. The problem occurs because a node, while beam-formed in one direction, cannot hear the RTS/CTS messages that arrive on another direction with information pertaining to channel reservation. A node, therefore, transmits when it should defer, leading to unnecessary collisions and degraded performance. In this paper, we propose a new MAC protocol that uses a combination of three features to combat the problem: fragmentation of packets, the use of a tone signal to alert potential collision-causing nodes during ongoing transmission, and the use of a pause period when transmission is likely to lead to a collision. As opposed to other work on this problem, our protocol does not assume separate data and control channels. We present simulation results showing that our protocol can reduce the number of retransmissions of data packets due to the unheard RTS/CTS problem by as much as 86%, thus improving the delay and throughput characteristics of the network.","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132830833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for supporting VoIP Services over the Downlink of an OFDMA Network","authors":"Patrick Hosein","doi":"10.1109/ISWPC.2007.342646","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342646","url":null,"abstract":"The fourth generation of wireless networks (4G) are presently being discussed in standards bodies (3GPP2, 3GPP, 802.16, 802.20) and one common conclusion is that the most appropriate technology for the forward link is orthogonal frequency division multiple access (OFDMA). In addition, it is believed that all services (i.e., both real-time services like voice and also data) can be supported over such a channel using an all-IP network. However, even for 3G networks, the efficient support of services such as voice over IP (VoIP) over wireless packet switched channels is still to be verified in the field. In this paper, we look at the issues involved in transporting VoIP over the forward link of an OFDMA network and propose a framework that can address many of these issues. We support our proposals with numerical results","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of SIP in internet connected MANETs","authors":"M.C. de Castro, A. Kassler","doi":"10.1109/ISWPC.2007.342645","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342645","url":null,"abstract":"Mobile ad hoc networking has been considered as one of the most important technologies to support future ubiquitous and pervasive computing scenarios and Internet connected MANETs will be an integral part of future wireless networks. For providing multimedia services and voice over IP in such environment, support for session initiation protocol (SIP) is essential. A MANET is a decentralized collection of autonomous nodes but a SIP infrastructure requires centralized proxies and registrar servers. In this paper, we study the implications of using standard SIP architecture in Internet connected MANETs. We analyze performance limitations of SIP service scalability when centralized proxies/registrars located in the access network are used by MANET nodes. We also present and compare an alternative approach to provide SIP services in Internet connected MANETs in order to minimize the impact of such performance limitations","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid Based Pervasive Distributed Storage","authors":"D. Arias, J. Sanabria, W. Rivera","doi":"10.1109/ISWPC.2007.342622","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342622","url":null,"abstract":"This paper describes a tool that implements a set of services to manipulate and store data from a sensor network in a transparent way to end users. A major requirement of this system is data availability and reliability. Consequently, we have implemented a replication schema based on the information dispersal algorithm (IDA). Preliminary results show that the IDA based replication provides better reliability and less storage spending than traditional replication. The storage scheme has been deployed on top of a Globus based infrastructure","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122020138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Profile-Based Peer-to-Peer RSS Information Distribution","authors":"A. Baumgart, H. Knapp, P. Suetterlin, M. Schader","doi":"10.1109/ISWPC.2007.342604","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342604","url":null,"abstract":"Really simple syndication (RSS) is an XML dialect that is widely used to distribute personalized information. From the user's perspective, RSS seems to be the ideal news reader technology because the RSS feeds notifies the user of information updates. In this paper we propose a profile-based peer-to-peer RSS information distribution for mobile devices using RSS feeds. We show how peers connect with each other and explain the mapping of user keywords with existing RSS feeds on other peers effectively. We have implemented a prototypical application and introduce the most important features","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"76 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}