2008 New Technologies, Mobility and Security最新文献

筛选
英文 中文
Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport Protocols 在多种传输协议上消费长寿命移动Web服务的体系结构
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.25
Fahad Aijaz, S. Adeli, B. Walke
{"title":"Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport Protocols","authors":"Fahad Aijaz, S. Adeli, B. Walke","doi":"10.1109/NTMS.2008.ECP.25","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.25","url":null,"abstract":"The concept of mobile Web services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. A Web service based middleware for mobile applications is a promising platform to accelerate the application development for mobile systems. This paper introduces a middleware for time independent Mob-WS that avoids the overheads of long durational synchronous communication. Details of communication architecture and interaction among the middleware components is presented and discussed. Due to the transport neutral nature of SOAP, the Bluetooth initial short-ranged transport protocol binding is briefly presented. Finally, some preliminary processing latencies are shown followed by conclusion.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Single Relay Cooperative ARQ protocol under Time Correlated Rayleigh Fading Channel 时间相关瑞利衰落信道下单中继协同ARQ协议性能分析
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.76
H. Cho, C. Lee, G. Hwang
{"title":"Performance Analysis of Single Relay Cooperative ARQ protocol under Time Correlated Rayleigh Fading Channel","authors":"H. Cho, C. Lee, G. Hwang","doi":"10.1109/NTMS.2008.ECP.76","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.76","url":null,"abstract":"In this paper, we analyze the performances of a cooperative ARQ protocol under Poisson arrivals and the time correlated Rayleigh fading channel environment. A two dimensional discrete time Markov chain is formulated for the analysis. Using the steady state analysis of the Markov chain, the average frame latency and the moment generating function of the service time of a frame are derived. We validate our analytical results by comparing them with simulation results. From our analysis, we show that the cooperative ARQ protocol outperforms the non-cooperative protocol. In addition, we see that the effect of time correlation of the fading channel is not negligible.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection 分布式DDoS入侵检测的分散告警关联方法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.36
R. Khatoun, G. Doyen, D. Gaïti, R. Saad, A. Serhrouchni
{"title":"Decentralized Alerts Correlation Approach for DDoS Intrusion Detection","authors":"R. Khatoun, G. Doyen, D. Gaïti, R. Saad, A. Serhrouchni","doi":"10.1109/NTMS.2008.ECP.36","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.36","url":null,"abstract":"Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture for an intrusion detection approach. The central point of this paper is the alert correlation among Snort intrusion detection systems (IDS). We believe that this approach optimizes the detection performance in a completely distributed fashion by relying on Pastry overlay network as indexing and routing protocol. We propose novel approach that will be improved in the future work.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Bayesian Filter to Detect Misbehaving Nodes in MANETs 基于贝叶斯滤波的manet异常节点检测
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.7
Youcef Beghriche, V. Toubiana, H. Labiod
{"title":"A Bayesian Filter to Detect Misbehaving Nodes in MANETs","authors":"Youcef Beghriche, V. Toubiana, H. Labiod","doi":"10.1109/NTMS.2008.ECP.7","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.7","url":null,"abstract":"Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Most MANET security solutions identify and exclude malicious and selfish nodes. These mechanisms rely on local monitoring tools to detect untrustworthy nodes and then spread trust information through recommendations. In this paper we apply a Bayesian model [1] to improve MANET security. We classify nodes behavior relying on a decision based on a probabilistic Bayesian model. The novelty of our approach is that it classifies nodes based on distant observations. We describe statistical parameters like Accuracy, Error and the Total Cost Ratio that are used to evaluate the efficiency of the filter through a set of simulations of an attacked pure ad hoc network.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficiency of PRI and WRR DiffServ Scheduling Mechanisms for Real-Time Services on UMTS Environment UMTS环境下实时业务的PRI和WRR DiffServ调度效率研究
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.40
N. Lopes, M. J. Nicolau, Alexandre J. T. Santos
{"title":"Efficiency of PRI and WRR DiffServ Scheduling Mechanisms for Real-Time Services on UMTS Environment","authors":"N. Lopes, M. J. Nicolau, Alexandre J. T. Santos","doi":"10.1109/NTMS.2008.ECP.40","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.40","url":null,"abstract":"The next generation of mobile phones will be probably all-IP based enabling users to access Internet services. In order to make this possible a satisfactory quality of service, at least equal to the fixed Internet, must be ensured. To achieve this goal an end-to-end QoS system must be constructed. Another fact is the dominance of IP over other technologies due, in large measure, to its characteristic of working with heterogeneous technologies. Consequently, being IP the common denominator on a heterogeneous environment, it is important to develop end-to-end IP QoS guarantees for the different applications over distinct access technologies. This is particularly important for cellular wireless networks due to the ever growing expansion of mobile phone users. One way to contribute to this goal is to apply DiffServ QoS mechanisms to UMTS technology in order to model an End-to-End QoS communication system. A mapping of DiffServ CodePoints into UMTS classes can be applied in order to get efficient PHB configurations. This paper proposes an architecture to support end-to-end quality of service to several application services running on mobile UMTS user agents and communicating with servers located in a wired internet. The proposed architecture is based on a DiffServ model, where QoS parameters are set either by the user agent or by the SGSN. In particular, RED queue management and PRI or WRR scheduling policies are enforced. Different UMTS traffic classes are mapped into different DiffServ parameters. The performance of this architecture has been evaluated by simulation using NS, assuming different network load scenarios. In particular, the delay and packet loss experienced by VoIP, Video, FTP and HTTP traffic are evaluated in the cases of PRI and WRR scheduling policies, and compared to those measured when DiffServ is not implemented. Finally, a revenue function to estimate the profits that an ISP could expect by using a DiffServ implementation on IP UMTS core routers is proposed.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131152625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Query Optimization in a Mediator for Digital Libraries 面向数字图书馆的中介查询优化
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.82
Faouzia Wadjinny, D. Chiadmi
{"title":"Query Optimization in a Mediator for Digital Libraries","authors":"Faouzia Wadjinny, D. Chiadmi","doi":"10.1109/NTMS.2008.ECP.82","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.82","url":null,"abstract":"Digital libraries are more and more available on the web. Unfortunately, their heterogeneity and distribution make retrieving information from them a difficult process. To overcome these difficulties, several solutions have been proposed. We adopt a virtual data integration approach based on mediation to access various digital libraries. In this context, a query posed to the mediator need to be translated into a sequence of queries to the underlying data sources. In a heterogeneous environment, with sources of diverse and limited query capabilities, not all of the translations are feasible. In this paper, we study the problem of finding feasible and efficient query plans to retrieve data from digital libraries. We present the formalism that we use to describe data sources capabilities. We propose an algorithm for producing equivalent query plans and a cost model for choosing the optimal plan.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of IPSec on the Performance of the IEEE 802.16 Wireless Networks IPSec对IEEE 802.16无线网络性能的影响
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.51
E. Barka, K. Shuaib, H. Chamas
{"title":"Impact of IPSec on the Performance of the IEEE 802.16 Wireless Networks","authors":"E. Barka, K. Shuaib, H. Chamas","doi":"10.1109/NTMS.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.51","url":null,"abstract":"The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. There has been extensive work on improving the security of IEEE Standard 802.16 for both fixed and mobile networks in PMP mode, but thus far there is scarcity of research on security in IEEE 802.16, and its impact on the performance on such networks. In this Paper, we investigate the impact of security, specifically, IPsec on the performance of the 802.16. We explore and analyze the impact of different implementations of encryption techniques, using the two IPsec transmission modes, Our analysis is based on simulation, using the well-known Qualnet software.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Link Adaptation Scheme for IEEE 802.11 WLANs 一种新的IEEE 802.11 wlan链路适配方案
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.11
A. Rebai, Mariem Fliss, S. Jarboui, S. Hanafi
{"title":"A New Link Adaptation Scheme for IEEE 802.11 WLANs","authors":"A. Rebai, Mariem Fliss, S. Jarboui, S. Hanafi","doi":"10.1109/NTMS.2008.ECP.11","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.11","url":null,"abstract":"The IEEE 802.11 WLAN becomes more applied for multimedia traffics that are very strict in terms of link rate and transmission delay performance. In this paper, the authors will study link adaptation requirements to allow the requested multimedia quality-based communications. The efficiency of rate control diagrams is linked to the fast channel variation response. A new dynamic time-based link adaptation mechanism, called MAARF (modified adaptive auto rate fallback), is proposed. Beside the transmission frame results, the new model implements round trip time (RTT) mechanism to choose adequately instantaneous link rate. This proposed model is evaluated with ARF (auto rate fallback) and AARF (adaptive ARF) schemes. Simulation results are given to illustrate the quality improvement of transmission link over Wi-Fi networks.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121589565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Energy Adaptive Approach In a Multi-Channel Dissemination-Based Network 多通道传播网络中的能量自适应方法
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.44
Ahmad S. Al-Mogren
{"title":"Energy Adaptive Approach In a Multi-Channel Dissemination-Based Network","authors":"Ahmad S. Al-Mogren","doi":"10.1109/NTMS.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.44","url":null,"abstract":"It is essential to manage data in the wireless environment. Through the use of dissemination technique, data may be retrieved by wireless users in an efficient manner. In this paper, I show a description of an architecture which is designed to provide a power-saving for the mobile clients' units in a multichannel dissemination-based network. I show how a suitable system fits in the overall telecommunication network. The aim of the system is to allow the clients to get the needed data in an efficient way, and at the same time to allow the participation of clients in updating the content of the disseminated data. A performance study shows that the power consumption, space overhead, and response time associated with the suggested approach is far less than other previous techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
AOnesC: An Aspect-Oriented Extension to nesC 一个面向方面的nesC扩展
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.24
E. Lakshika, C. Keppitiyagama, Dulan Wathugala
{"title":"AOnesC: An Aspect-Oriented Extension to nesC","authors":"E. Lakshika, C. Keppitiyagama, Dulan Wathugala","doi":"10.1109/NTMS.2008.ECP.24","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.24","url":null,"abstract":"Aspect-oriented programming (AOP) is a programming paradigm which enhances the concept of \"separation of concerns\" by introducing a mechanism to modularize crosscutting concerns in a better way. While AOP based extensions have earned a superior popularity in various domains, for some domains, AOP is still immature. The domain of wireless sensor networks is such an area where application of AOP techniques is lacking. Currently, almost all the programming languages for implementing wireless sensor networks do not provide mechanisms to modularize crosscutting concerns in a precise way. In this paper, we present the design and development of AOnesC language, which is an aspect-oriented extension to nesC language. Since nesC language plays a major role in the domain of wireless sensor networks, we expect this AOP based extension would enable sensor network application developers to gain benefits of AOP techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信