Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360954
Zhongwei Sun, Yaning Ma, Qingrui Guo, Fengjie Sun
In electrical power industry, a reliable communication network constitutes the core of the distribution automation system (DAS). This paper first proposes a novel communication method for distribution automation using Ethernet Passive Optical Networks (EPON). Then, based on the symmetric cryptographic techniques, a secure DAS communication architecture is presented. Following the standard registration procedure, the mutual device authentication between the OLT and the ONU is finally implemented.
{"title":"Security mechanism for distribution automation using EPON","authors":"Zhongwei Sun, Yaning Ma, Qingrui Guo, Fengjie Sun","doi":"10.1109/ICNIDC.2009.5360954","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360954","url":null,"abstract":"In electrical power industry, a reliable communication network constitutes the core of the distribution automation system (DAS). This paper first proposes a novel communication method for distribution automation using Ethernet Passive Optical Networks (EPON). Then, based on the symmetric cryptographic techniques, a secure DAS communication architecture is presented. Following the standard registration procedure, the mutual device authentication between the OLT and the ONU is finally implemented.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360909
Jun Won Lim, Sanghoon Lee, I. Suh, Kyung Jin Kim
Simulation environment is very useful as it provides ground to virtually embody robots in the designing stage. There will be applied Player/Stage, one of the robot simulation and control environments, to Roboid Studio which is a component-based framework. Here, robots are controlled based on simulacrum. Several issues will be discussed to get Player/Stage to work as a component for Roboid Studio.
{"title":"Development of a Roboid component for Player/Stage Robot Simulator","authors":"Jun Won Lim, Sanghoon Lee, I. Suh, Kyung Jin Kim","doi":"10.1109/ICNIDC.2009.5360909","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360909","url":null,"abstract":"Simulation environment is very useful as it provides ground to virtually embody robots in the designing stage. There will be applied Player/Stage, one of the robot simulation and control environments, to Roboid Studio which is a component-based framework. Here, robots are controlled based on simulacrum. Several issues will be discussed to get Player/Stage to work as a component for Roboid Studio.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360851
Dongchao Ma, Xue Chen, Ning Wang, N. Zhang
This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.
{"title":"A novel scheme for the transmission of P2P service in the broadband access network","authors":"Dongchao Ma, Xue Chen, Ning Wang, N. Zhang","doi":"10.1109/ICNIDC.2009.5360851","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360851","url":null,"abstract":"This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360785
Zezhi Zhu, Ping Lin, Luying Chen, Kun Zhang
When match against Chinese keyword for network content audit, one of the biggest problems is that there is interference of “noise characters”, it makes the traditional way using explicit string pattern to match infeasible. Regular expression matching can solve the problem perfectly, but the DFA-base approaches for regular expression matching will also encounter the problem of excessive memory usage. In this paper, we try to solve the problem encountered when applying regular expression to Chinese network content audit. We propose a regular expression rewriting techniques and grouping principle that can solve excessive memory usage problem in DFA-based approach. Our solution can make it possible to apply regular expression to Chinese network content audit.
{"title":"Memory-efficient regular expression matching for Chinese network content audit","authors":"Zezhi Zhu, Ping Lin, Luying Chen, Kun Zhang","doi":"10.1109/ICNIDC.2009.5360785","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360785","url":null,"abstract":"When match against Chinese keyword for network content audit, one of the biggest problems is that there is interference of “noise characters”, it makes the traditional way using explicit string pattern to match infeasible. Regular expression matching can solve the problem perfectly, but the DFA-base approaches for regular expression matching will also encounter the problem of excessive memory usage. In this paper, we try to solve the problem encountered when applying regular expression to Chinese network content audit. We propose a regular expression rewriting techniques and grouping principle that can solve excessive memory usage problem in DFA-based approach. Our solution can make it possible to apply regular expression to Chinese network content audit.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360808
Dazhong He, Wenli Zhou, Xiang Zhang
In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class token bucket mechanism is presented to achieve this goal. Furthermore, experiments and tests have proved that this solution is effective.
{"title":"A bi-direction adjustable token bucket mechanism for multi-class bandwidth guarantee and sharing","authors":"Dazhong He, Wenli Zhou, Xiang Zhang","doi":"10.1109/ICNIDC.2009.5360808","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360808","url":null,"abstract":"In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class token bucket mechanism is presented to achieve this goal. Furthermore, experiments and tests have proved that this solution is effective.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360962
Meigen Huang, Jianrong Liu, Yunjie Zhou
Neighbor Discovery protocol can be used to communicate between neighboring nodes in the Mobile IPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, Denial-of-Service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of Secure Neighbor Discovery protocol in Mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.
{"title":"An improved SEND protocol against DoS attacks in Mobile IPv6 environment","authors":"Meigen Huang, Jianrong Liu, Yunjie Zhou","doi":"10.1109/ICNIDC.2009.5360962","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360962","url":null,"abstract":"Neighbor Discovery protocol can be used to communicate between neighboring nodes in the Mobile IPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, Denial-of-Service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of Secure Neighbor Discovery protocol in Mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360901
Dan Guo, Fuhong Lin, Changjia Chen
In this paper, we focus on an Online Social Network (OSN), namely “kaixin-net” (www.kaixin001.com) which is one of the biggest OSNs in China. Based on studying the most popular game ‘Buying-a-house’, we investigate user behaviors. First, we made a model for “Buying-a-house”, then using the dataset that we crawled and traced (we crawled about one hundred and fifty user's profiles and traced forty users for about twenty days), we draw the following findings: (1) People who just join the game have much interest in this OSN, actively interact with his friends. (2) The interest goes down according to the time lapse for most of users, but there are also a few players whose interests never go down and enjoy this game very much. These can be interpreted as the population of kaixin-net is growing at the beginning state, but it will decline after the peak comes. So the organizers should think about how to slow down the peak's coming.
{"title":"User behaviors in an Online Social Network","authors":"Dan Guo, Fuhong Lin, Changjia Chen","doi":"10.1109/ICNIDC.2009.5360901","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360901","url":null,"abstract":"In this paper, we focus on an Online Social Network (OSN), namely “kaixin-net” (www.kaixin001.com) which is one of the biggest OSNs in China. Based on studying the most popular game ‘Buying-a-house’, we investigate user behaviors. First, we made a model for “Buying-a-house”, then using the dataset that we crawled and traced (we crawled about one hundred and fifty user's profiles and traced forty users for about twenty days), we draw the following findings: (1) People who just join the game have much interest in this OSN, actively interact with his friends. (2) The interest goes down according to the time lapse for most of users, but there are also a few players whose interests never go down and enjoy this game very much. These can be interpreted as the population of kaixin-net is growing at the beginning state, but it will decline after the peak comes. So the organizers should think about how to slow down the peak's coming.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360862
X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su
Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded ARM hardware platform and transplanting corresponding Ad Hoc protocol onto it. Our tests show that the platform we developed has realized the function of the Ad Hoc network successfully. Finally, we give some performance evaluation of this platform and propose possible solutions to improve it.
Ad Hoc网络是一种点对点无线网络,在军事和传感器网络中起着非常重要的作用。Ad Hoc网络虽然具有很大的潜在用途,但由于存在多方面的问题,目前实际应用并不多。一个强大的方便的移动设备是问题之一。本文通过构建嵌入式ARM硬件平台,并在其上移植相应的ad hoc协议,实现了一个ad hoc网络平台。测试表明,我们开发的平台成功地实现了Ad Hoc网络的功能。最后,对该平台进行了性能评价,并提出了可能的改进方案。
{"title":"Implementation of Ad Hoc network terminal based on embedded ARM platform","authors":"X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su","doi":"10.1109/ICNIDC.2009.5360862","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360862","url":null,"abstract":"Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded ARM hardware platform and transplanting corresponding Ad Hoc protocol onto it. Our tests show that the platform we developed has realized the function of the Ad Hoc network successfully. Finally, we give some performance evaluation of this platform and propose possible solutions to improve it.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"634 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360973
Ming Xu
In view of the difficulty for nodes to renew the power and the structure of the wireless sensor networks, this paper presents a model of the data preprocessing of wireless sensor networks based on multi-agents by means of utilizing independent and intelligent of Multi-Agents. Then this paper introduces the structure of model and every Agent's function and trait. Moreover, the model also presents the algorithm to accomplish data preprocessing and avoids the error of the data collection. Thus this model could help to reduce the energy consumption attribute to communication between the nodes and enhance the effectiveness of data transmission.
{"title":"Research and design of data preprocessing of wireless sensor networks based on Multi-Agents","authors":"Ming Xu","doi":"10.1109/ICNIDC.2009.5360973","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360973","url":null,"abstract":"In view of the difficulty for nodes to renew the power and the structure of the wireless sensor networks, this paper presents a model of the data preprocessing of wireless sensor networks based on multi-agents by means of utilizing independent and intelligent of Multi-Agents. Then this paper introduces the structure of model and every Agent's function and trait. Moreover, the model also presents the algorithm to accomplish data preprocessing and avoids the error of the data collection. Thus this model could help to reduce the energy consumption attribute to communication between the nodes and enhance the effectiveness of data transmission.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360834
Runze Wu, Xingqin Jiao, Dachuan Qu, Yuefeng Ji
A distributed data transport service implementing strategy is proposed to support grid network service with dynamic optical resource provisioning. The distributed data transport provides grid user with dynamic lightpaths. The test bed circling the resource managing and scheduling mechanism is built on the base of Globus Tookit 4. Optical grid middleware is developed to achieve grid network service, combining GridFTP and GMPLS network control, supporting network resource discovering, management and reservation. Also, the big-bulk data transport application spreads on the test bed with parallel lightpaths with the distributed and parallel transporting for the different data slices.
{"title":"Distributed data transport service implement strategy in optical grid","authors":"Runze Wu, Xingqin Jiao, Dachuan Qu, Yuefeng Ji","doi":"10.1109/ICNIDC.2009.5360834","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360834","url":null,"abstract":"A distributed data transport service implementing strategy is proposed to support grid network service with dynamic optical resource provisioning. The distributed data transport provides grid user with dynamic lightpaths. The test bed circling the resource managing and scheduling mechanism is built on the base of Globus Tookit 4. Optical grid middleware is developed to achieve grid network service, combining GridFTP and GMPLS network control, supporting network resource discovering, management and reservation. Also, the big-bulk data transport application spreads on the test bed with parallel lightpaths with the distributed and parallel transporting for the different data slices.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}