{"title":"Introduction of Security in the Service Level Negotiated with SLNP Protocol","authors":"M. Chalouf, X. Delord, F. Krief","doi":"10.1109/NTMS.2008.ECP.53","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.53","url":null,"abstract":"Today, the evolution of IP networks and the diversity of the data flowing through these networks require domain managers to ensure quality of service (QoS), security and mobility for various communications. Security and QoS can be negotiated between domain managers implied in a service offer. The SLNP (Service Level Negotiation Protocol) protocol allows the negotiation of a service level QoS and it functions in the interoperable environment of web services. The objective of this paper is to consider QoS requirements of the communications when security is introduced in the service level negotiated with the SLNP protocol.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple and Efficient Detection of Wormhole Attacks","authors":"Dang-Quan Nguyen, L. Lamont","doi":"10.1109/NTMS.2008.ECP.14","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.14","url":null,"abstract":"Wormhole attacks in mobile ad hoc networks (MANET) have long been considered a serious threat to MANET's routing. Most of the existing proposals rely on GPS devices and require that the node's clocks are synchronized. Such constraints naturally lead to limitations of applicability since GPS does not operate well in obstructed areas, and clock synchronization in MANET is not always accurate. In this paper, we propose an efficient and simple way to detect wormhole attacks, using a technique called reference broadcast. GPS devices are not required, and clocks do not need to be synchronized. In fact, no particular assumption is made on the communication equipment. We show that our solution can be easily implemented, using either the well-known routing protocol OLSR or any neighbor discovery protocol. Our solution also exhibits a high degree of accuracy in detecting wormhole attacks.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NETPOPPS: A Network Provider Oriented Peer-to-Peer System","authors":"Marguerite Fayçal, A. Serhrouchni","doi":"10.1109/NTMS.2008.ECP.70","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.70","url":null,"abstract":"Despite various hurdles, such as copyright issues, legality matters, and security concerns, the Peer-to-Peer (P2P) traffic still grows and appears somehow daunting for network providers. In fact, P2P networks lay over the Internet network, which is composed of tens of thousands smaller networks called Autonomous Systems (AS) and belonging to various administrative entities: network providers, universities, companies, etc. Bilateral connections between ASs are governed by business agreements negotiated between the corresponding administrative entities [1]: it is a financial matter. However, in P2P networks, routing tasks are distributed across all system peers in an autonomous and spontaneous way without taking the IP network into account. In this paper, we propose a novel scheme, called NETwork Provider Oriented Peer-to-Peer System (NETPOPPS), which allows an effective cooperation between P2P traffic and network providers' economic agreements. NETPOPPS also promises alleviated message latency and enhanced lookup time.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amina El Gonnouni, S. Pino-Povedano, F. González-Serrano, A. Lyhyaoui
{"title":"Support Vector Machines for Multiple Targets Tracking with Sensor Networks","authors":"Amina El Gonnouni, S. Pino-Povedano, F. González-Serrano, A. Lyhyaoui","doi":"10.1109/NTMS.2008.ECP.93","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.93","url":null,"abstract":"In this paper, we address the problem of tracking multiple targets trajectories that potentially cross each other. We propose a solution to this problem by using the support vector machines (SVM) to predict the position of the targets from the past history of the measurements. We will predict the dynamic behaviour of the targets using the SVM method, after turning off the sensing mode. By this way, we will avoid wrong measures that might take sensors and which are due to the superposition of physical signals. The simulations results demonstrate the potential advantage of this approach.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization of Anchor Nodes for Wireless Sensor Networks","authors":"Qiao-Ling Du, Z. Qian, Hong Jiang, Shuxun Wang","doi":"10.1109/NTMS.2008.ECP.57","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.57","url":null,"abstract":"Many localization methods for wireless sensor networks (WSN) have been proposed by far. These methods are usually aimed at how to locate unknown nodes or how to improve performance of localization under a certain density of anchor nodes. However, localization method for anchor nodes is limited to GPS or hand-placing method merely. It is imperative to explore another method that is efficient and cost-effective to realize localization of anchor nodes. And how new anchor nodes replace old anchor nodes is also a problem because of power consuming. This paper addresses the problem of locating anchor nodes in WSN and presents a new method to locate anchor nodes. The method presented herein relies on magnetic localization technique. Based on the magnetic dipole model, the algorithm of locating anchor nodes is derived. Also, the method can resolve easily the problem that new anchor nodes replace old anchor nodes. The simulation results show its performance.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Cost Differential GPS Receivers (LCD-GPS): The Differential Correction Function","authors":"M. Kara, K. Hou","doi":"10.1109/NTMS.2008.ECP.58","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.58","url":null,"abstract":"Wireless Sensor Networks (WSN) are used in many applications such as environmental data collection, smart home, smart care and intelligent transportation system. Sensor nodes composing the WSN cooperate together in order to monitor physical entities such as temperature, humidity, sound, atmospheric pressure, motion or pollutants at different locations. To have location information, it is possible to configure nodes with their locations, in small deployments, but in large-scale deployments or when the nodes are mobile, the use of GPS is very interesting. However, the current accuracy of standard civil GPS is not sufficient for all WSN applications. Indeed, GPS measurements suffer from many errors especially in city. To improve GPS accuracy the differential mode (DGPS) has been introduced. In this paper, we present a WSN used to provide a DGPS solution. It's consisting of a set of low cost standard civil GPS communicating receivers. We present the design, implementation and some experimental results of this solution.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems","authors":"S. Rekhis, N. Boudriga","doi":"10.1109/NTMS.2008.ECP.27","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.27","url":null,"abstract":"We propose in this paper a framework for digital investigation of security incidents in multi-hop wireless systems. A cooperative observation network, composed of randomly distributed observer nodes, is set up to monitor nodes mobility, topology variation, and patterns of executed actions. A set of techniques to aggregate, merge, and analyze evidences is proposed to reconstruct potential attack scenarios and identify paths of packets transfer.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of a Novel Bandwidth Management Framework for IEEE 802.16 Based on Aggregation","authors":"Mohamad El Masri, Slim Abdellatif, G. Juanole","doi":"10.1109/NTMS.2008.ECP.81","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.81","url":null,"abstract":"In an environment where IEEE 802.16 access networks are used as a backbone for a heterogeneous wireless access network, the question of Quality of Service brings along a questioning on several other aspects: scalability, guarantees, scheduling among others. We give in this paper a general solution answering those questions. This solution is based on an aggregated bandwidth management in the backbone. This aggregation along with specific bandwidth request and scheduling policies are herein specified and discussed.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizing On-Body Wireless Sensor Networks","authors":"Carla Oliveira, Luís D. Pedrosa, R. Rocha","doi":"10.1109/NTMS.2008.ECP.30","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.30","url":null,"abstract":"The main goal of this work is to characterise communications through body area networks (BANs), analysing how the human body affects wireless links qualities. 802.15.4 MICAz motes were deployed on seven on-body locations of four volunteers and a test-dummy. The quality of the communications was monitored in order to study the channel behaviour. Results show that the human body clearly modifies communication properties, introducing attenuations of up to 26 dB. Differences between male and female subjects were found to be unimportant. Body posture affects the performance, mainly because of body shadowing. LoS together with the channels dynamic nature are key issues to achieve connectivity. Power settings and the local environment also influence the BANs performance.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Cyber Crime and Mental Illness","authors":"Shabana Kabeer, M. U. Shaikh","doi":"10.1109/NTMS.2008.ECP.96","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.96","url":null,"abstract":"In this paper an attempt is made to describe the relationship between cyber crime and mental illness. It will create awareness among people about cyber crimes and criminality due to mental illness. Computers and the internet make many actions easier for us. They also make many unlawful activities easier for criminals such as the sharing of, copy right infringement, stock manipulation, child pornography and a range of scams. In order to understand the criminal activity it is important to understand the main factor behind the criminal activity for e.g. mental illness.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}