Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210183
A. Khalili, Jonathan Katz, W. Arbaugh
Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.
{"title":"Toward secure key distribution in truly ad-hoc networks","authors":"A. Khalili, Jonathan Katz, W. Arbaugh","doi":"10.1109/SAINTW.2003.1210183","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210183","url":null,"abstract":"Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210159
S. Sakane, N. Okabe, K. Kamada, H. Esaki
When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called "IPsec" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.
{"title":"Applying Kerberos to the communication environment for information appliances","authors":"S. Sakane, N. Okabe, K. Kamada, H. Esaki","doi":"10.1109/SAINTW.2003.1210159","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210159","url":null,"abstract":"When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called \"IPsec\" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210167
G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori
Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.
{"title":"SNMP in the IPv6 context","authors":"G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori","doi":"10.1109/SAINTW.2003.1210167","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210167","url":null,"abstract":"Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210185
Sankar Kaliaperumal
Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.
{"title":"Securing authentication and privacy in ad hoc partitioned networks","authors":"Sankar Kaliaperumal","doi":"10.1109/SAINTW.2003.1210185","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210185","url":null,"abstract":"Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210153
T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura
We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.
{"title":"Software compatibility and human interface for DV over IP","authors":"T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura","doi":"10.1109/SAINTW.2003.1210153","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210153","url":null,"abstract":"We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210190
Panos Papadimitratos, Z. Haas
Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.
{"title":"Secure link state routing for mobile ad hoc networks","authors":"Panos Papadimitratos, Z. Haas","doi":"10.1109/SAINTW.2003.1210190","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210190","url":null,"abstract":"Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210143
Shiro Uesugi
E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional "cash vs. goods" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, "Local currency becomes global currency" in cross border trading.
{"title":"An insight for consequences of e-business: possible case of cross border trading without using hard currency","authors":"Shiro Uesugi","doi":"10.1109/SAINTW.2003.1210143","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210143","url":null,"abstract":"E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional \"cash vs. goods\" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, \"Local currency becomes global currency\" in cross border trading.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210192
Ray S. Atarashi, J. Kishigami, S. Sugimoto
Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.
{"title":"Metadata and new challenges","authors":"Ray S. Atarashi, J. Kishigami, S. Sugimoto","doi":"10.1109/SAINTW.2003.1210192","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210192","url":null,"abstract":"Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210140
K. Naruse
Based on the user questionnaires conducted through the Internet, topics such as: purpose and place of access to the mobile Internet; the phone, mail and Web usage patterns; current usage of E-commerce; willingness to use new types of services were analyzed. Responses from various age groups were compiled and evaluated, and the results have shown that the main purpose of access largely depends on the users' age/sex group, and that the main place of use depends on their profession. These results led us to some hypotheses, accordingly.
{"title":"The survey of the mobile Internet, usage and awareness, study for m-commerce","authors":"K. Naruse","doi":"10.1109/SAINTW.2003.1210140","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210140","url":null,"abstract":"Based on the user questionnaires conducted through the Internet, topics such as: purpose and place of access to the mobile Internet; the phone, mail and Web usage patterns; current usage of E-commerce; willingness to use new types of services were analyzed. Responses from various age groups were compiled and evaluated, and the results have shown that the main purpose of access largely depends on the users' age/sex group, and that the main place of use depends on their profession. These results led us to some hypotheses, accordingly.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210177
K. S. King, S. Bradner
The Internet Emergency Preparedness (ieprep) working group of the IETF is addressing requirements for emergency systems for the Internet and other IP-based networks. The charter of the ieprep group is to produce requirements document(s) that detail specific functions and technologies needed to provide support for emergency preparedness systems in the Internet. These requirements will be published as RFCs, the IETF publication series. These include telephony specific requirements as well as other applications running over the Internet. Existing emergency preparedness systems are based upon circuit-switched network technology and preserving that functionality when these networks are interworked with IP-based networks is a chief concern. In addition, IP networks may offer preferential treatment to emergency communications if augmented with the appropriate mechanisms. The ieprep working group defines requirements that will be fulfilled by the appropriate working groups within the IETF.
{"title":"Internet emergency preparedness in the IETF","authors":"K. S. King, S. Bradner","doi":"10.1109/SAINTW.2003.1210177","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210177","url":null,"abstract":"The Internet Emergency Preparedness (ieprep) working group of the IETF is addressing requirements for emergency systems for the Internet and other IP-based networks. The charter of the ieprep group is to produce requirements document(s) that detail specific functions and technologies needed to provide support for emergency preparedness systems in the Internet. These requirements will be published as RFCs, the IETF publication series. These include telephony specific requirements as well as other applications running over the Internet. Existing emergency preparedness systems are based upon circuit-switched network technology and preserving that functionality when these networks are interworked with IP-based networks is a chief concern. In addition, IP networks may offer preferential treatment to emergency communications if augmented with the appropriate mechanisms. The ieprep working group defines requirements that will be fulfilled by the appropriate working groups within the IETF.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}