Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784852
R. Martínez-Álvarez, J. L. Rodriguez-Diez-Caballero, J. M. P. Carballo, S. Costas-Rodríguez, P. Rodríguez-Hernández, F. González-Castaño, M. J. F. Iglesias
This paper focuses on automated content update for MHP applications. Some of the authors have been involved in the first MHP trials of TVG, the TV channel of Galicia, NW Spain (three million population). It has a 30% share at regional level, competing with national channels. However, the initial MHP trials have raised the problem of manual content update cost, since in many key applications, like news and weather forecasts, contents vary on a daily basis. We have reviewed the status of MHP deployment in similar TV channels, and we have determined that the problem is currently relevant. We describe our solutions for automated content update with minimal human intervention, and our practical experience with them.
{"title":"Automating Content Update for MHP Applications: A Practical Experience","authors":"R. Martínez-Álvarez, J. L. Rodriguez-Diez-Caballero, J. M. P. Carballo, S. Costas-Rodríguez, P. Rodríguez-Hernández, F. González-Castaño, M. J. F. Iglesias","doi":"10.1109/CCNC.2009.4784852","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784852","url":null,"abstract":"This paper focuses on automated content update for MHP applications. Some of the authors have been involved in the first MHP trials of TVG, the TV channel of Galicia, NW Spain (three million population). It has a 30% share at regional level, competing with national channels. However, the initial MHP trials have raised the problem of manual content update cost, since in many key applications, like news and weather forecasts, contents vary on a daily basis. We have reviewed the status of MHP deployment in similar TV channels, and we have determined that the problem is currently relevant. We describe our solutions for automated content update with minimal human intervention, and our practical experience with them.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129745760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784779
B. Tian, E. Chang, T. Dillon, Song Han, F. Hussain
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network. A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairing-based authenticated self-healing key distribution scheme. The scheme achieves a number of excellent properties. Firstly, the users can check the integrity and correctness of the ciphertext before carrying out more complex key recovery operations thus fruitless work can be avoided. Secondly, the scheme is collusion-free for any coalition of non-authorized users. Thirdly, the private key has nothing to do with the number of revoked users and can be reused as long as it is not disclosed. Finally, the storage overhead for each user is a constant.
{"title":"An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings","authors":"B. Tian, E. Chang, T. Dillon, Song Han, F. Hussain","doi":"10.1109/CCNC.2009.4784779","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784779","url":null,"abstract":"Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network. A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairing-based authenticated self-healing key distribution scheme. The scheme achieves a number of excellent properties. Firstly, the users can check the integrity and correctness of the ciphertext before carrying out more complex key recovery operations thus fruitless work can be avoided. Secondly, the scheme is collusion-free for any coalition of non-authorized users. Thirdly, the private key has nothing to do with the number of revoked users and can be reused as long as it is not disclosed. Finally, the storage overhead for each user is a constant.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129237878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784766
Ying Li, Zhuo Li, M. Chiang, A. Calderbank
The Peer-to-Peer (P2P) streaming has shown as an effective solution for wireline video applications, while for the wireless video streaming applications, the limited radio resource and battery energy are the main constraints on the way of P2P applications. An important issue in live video streaming quality of service is to avoid playback buffer underflow, and a challenge from wireless applications is the desire of energy efficiency. The problem we try to solve is how to utilize P2P schemes in video streaming and schedule the video transmission among peers to minimize the "freeze-ups" in playback caused by buffer underflow. In this work, we propose energy-efficient algorithm for the video transmission scheduling in wireless P2P live streaming system, to minimize the playback freeze-ups among peers. Further the algorithm is extended to two scenarios: peers' reluctance of consuming battery energy and allowing overhearing, with alternative energy-efficient algorithms proposed for the second scenario. Numerical results show the effectiveness of the proposed algorithms. The results also demonstrate that peers' selfishness may reduce the energy efficiency, but allowing overhearing could increase energy efficiency.
{"title":"Energy-Efficient Video Transmission Scheduling for Wireless Peer-to-Peer Live Streaming","authors":"Ying Li, Zhuo Li, M. Chiang, A. Calderbank","doi":"10.1109/CCNC.2009.4784766","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784766","url":null,"abstract":"The Peer-to-Peer (P2P) streaming has shown as an effective solution for wireline video applications, while for the wireless video streaming applications, the limited radio resource and battery energy are the main constraints on the way of P2P applications. An important issue in live video streaming quality of service is to avoid playback buffer underflow, and a challenge from wireless applications is the desire of energy efficiency. The problem we try to solve is how to utilize P2P schemes in video streaming and schedule the video transmission among peers to minimize the \"freeze-ups\" in playback caused by buffer underflow. In this work, we propose energy-efficient algorithm for the video transmission scheduling in wireless P2P live streaming system, to minimize the playback freeze-ups among peers. Further the algorithm is extended to two scenarios: peers' reluctance of consuming battery energy and allowing overhearing, with alternative energy-efficient algorithms proposed for the second scenario. Numerical results show the effectiveness of the proposed algorithms. The results also demonstrate that peers' selfishness may reduce the energy efficiency, but allowing overhearing could increase energy efficiency.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784751
Jinglong Zhou, M. Jacobsson, E. Onur, I. Niemegeers
Accurate and fast wireless link quality assessment (LQA) for wireless channels would bring huge benefits for mobile multi-hop and multi-rate wireless ad hoc and sensor networks in the form of improved end-to-end performance. In this paper, we propose a novel LQA method based on cross-layer information. The method is implemented in a real test-bed, which is based on IEEE 802.11b/g, and achieved a significant LQA improvement up to 50% in mobile scenarios without introducing overhead. The effectiveness of accurate and fast LQA is demonstrated by feeding it into the routing layer to enable the route decisions to adapt faster during changing situations, especially in mobile scenarios. The experiment results show that the proposed LQA method can lead to faster and smarter routing decisions and higher end-to-end throughput compared to traditional methods, which only use hello packets to determine the link quality in mobile scenario.
{"title":"A Novel Link Quality Assessment Method for Mobile Multi-Rate Multi-Hop Wireless Networks","authors":"Jinglong Zhou, M. Jacobsson, E. Onur, I. Niemegeers","doi":"10.1109/CCNC.2009.4784751","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784751","url":null,"abstract":"Accurate and fast wireless link quality assessment (LQA) for wireless channels would bring huge benefits for mobile multi-hop and multi-rate wireless ad hoc and sensor networks in the form of improved end-to-end performance. In this paper, we propose a novel LQA method based on cross-layer information. The method is implemented in a real test-bed, which is based on IEEE 802.11b/g, and achieved a significant LQA improvement up to 50% in mobile scenarios without introducing overhead. The effectiveness of accurate and fast LQA is demonstrated by feeding it into the routing layer to enable the route decisions to adapt faster during changing situations, especially in mobile scenarios. The experiment results show that the proposed LQA method can lead to faster and smarter routing decisions and higher end-to-end throughput compared to traditional methods, which only use hello packets to determine the link quality in mobile scenario.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4785020
A. Fasbender, Martin Gerdes, Takeshi Matsumura, Andreas Häber, F. Reichert
In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.
{"title":"Media Delivery to Remote Renderers Controlled by the Mobile Phone","authors":"A. Fasbender, Martin Gerdes, Takeshi Matsumura, Andreas Häber, F. Reichert","doi":"10.1109/CCNC.2009.4785020","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785020","url":null,"abstract":"In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel Trojan detection and defense system. The prototype searches the important files which contain users' confidential information on the disk. And then, these files will be monitored to find which processes will access them by capturing and analyzing the IRPs (I/O Request Packets). The processes of Trojans will be distinguished from regular ones by evaluating their API-calls with several machine-learning models, rather than traditional signature-based mechanism. Testing results show that this prototype could detect and defend the unknown Trojans quickly and accurately.
{"title":"Prototype Demonstration: Trojan Detection and Defense System","authors":"Ting Liu, X. Guan, Q. Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang","doi":"10.1109/CCNC.2009.4785028","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785028","url":null,"abstract":"This paper presents a novel Trojan detection and defense system. The prototype searches the important files which contain users' confidential information on the disk. And then, these files will be monitored to find which processes will access them by capturing and analyzing the IRPs (I/O Request Packets). The processes of Trojans will be distinguished from regular ones by evaluating their API-calls with several machine-learning models, rather than traditional signature-based mechanism. Testing results show that this prototype could detect and defend the unknown Trojans quickly and accurately.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784880
Yingnan Zhu, Wei Liu, L. Dong, W. Zeng, H. H. Yu
As the Next Generation Network gains increasing attention, IPTV has been recognized as an efficient way to provide key IP multimedia services. Compared to conventional TV services, IPTV is sensitive to the IP network characteristics such as packet loss, delay and jittering. In addition, the potential long delay in channel switching is another significant challenge for IPTV systems. In this paper, to improve the QoS (Quality of Service) and QoE (Quality of Experience), we propose a framework which includes (1) introducing server-side bit-rate adaptation to deal with bandwidth variation; (2) multicasting low bit-rate videos for preview of multi-channel programs and Picture-in-Picture (PiP); and (3) using a two-step P-frame switching mechanism to reduce the delay in channel switching. Our results from a real-world test-bed show that the proposed framework greatly improves the perceived video quality and user experience at the client side.
{"title":"High Performance Adaptive Video Services Based on Bitstream Switching for IPTV Systems","authors":"Yingnan Zhu, Wei Liu, L. Dong, W. Zeng, H. H. Yu","doi":"10.1109/CCNC.2009.4784880","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784880","url":null,"abstract":"As the Next Generation Network gains increasing attention, IPTV has been recognized as an efficient way to provide key IP multimedia services. Compared to conventional TV services, IPTV is sensitive to the IP network characteristics such as packet loss, delay and jittering. In addition, the potential long delay in channel switching is another significant challenge for IPTV systems. In this paper, to improve the QoS (Quality of Service) and QoE (Quality of Experience), we propose a framework which includes (1) introducing server-side bit-rate adaptation to deal with bandwidth variation; (2) multicasting low bit-rate videos for preview of multi-channel programs and Picture-in-Picture (PiP); and (3) using a two-step P-frame switching mechanism to reduce the delay in channel switching. Our results from a real-world test-bed show that the proposed framework greatly improves the perceived video quality and user experience at the client side.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784792
Sanhae Kim, Dongjun Lee, Oh-Soon Shin, Y. Shin
In mobile WiMAX systems, uplink collaborative MIMO (Multiple Input Multiple Output) performs spatial multiplexing with two PSSs (Portable Subscriber Stations), each with one antenna. As two PSSs transmit collaboratively on the same sub-channel, the overall uplink capacity will be doubled. To perform this interesting technique with high performance, most system venders demand the optimal MLD (Maximum-Likelihood Detection) in the RAS (Radio Access Station). However, the MLD is difficult to implement due to its explosive computational complexity. In this paper, we propose a two-step MIMO decoding scheme which achieves near ML performance with low complexity for CSM (Collaborative Spatial Multiplexing) in uplink mobile WiMAX systems that having an iterative channel decoder using bit LLR (Log-Likelihood Ratio) information. Simulation results show that the proposed scheme has almost the same BLER (BLock Error Rate) performance of the MLD with only about 15.75% computational complexity in terms of real multiplication, when both PSSs transmit with 16QAM (Quadrature Amplitude Modulation) modulation.
{"title":"Near Maximum-Likelihood Detection with Low Complexity for Collaborative Spatial Multiplexing in Uplink Mobile WiMAX Systems","authors":"Sanhae Kim, Dongjun Lee, Oh-Soon Shin, Y. Shin","doi":"10.1109/CCNC.2009.4784792","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784792","url":null,"abstract":"In mobile WiMAX systems, uplink collaborative MIMO (Multiple Input Multiple Output) performs spatial multiplexing with two PSSs (Portable Subscriber Stations), each with one antenna. As two PSSs transmit collaboratively on the same sub-channel, the overall uplink capacity will be doubled. To perform this interesting technique with high performance, most system venders demand the optimal MLD (Maximum-Likelihood Detection) in the RAS (Radio Access Station). However, the MLD is difficult to implement due to its explosive computational complexity. In this paper, we propose a two-step MIMO decoding scheme which achieves near ML performance with low complexity for CSM (Collaborative Spatial Multiplexing) in uplink mobile WiMAX systems that having an iterative channel decoder using bit LLR (Log-Likelihood Ratio) information. Simulation results show that the proposed scheme has almost the same BLER (BLock Error Rate) performance of the MLD with only about 15.75% computational complexity in terms of real multiplication, when both PSSs transmit with 16QAM (Quadrature Amplitude Modulation) modulation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784982
C. Jacob, Lei Zhang, A. Kress, S. Steglich, Tian Hui
Evolving device capabilities and network technologies make the seamless combination of personal area and wide area networks capable and desirable to exploit advantages of each of the environments. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. In this paper, we describe an approach that addresses the convergence of personal area and wide area networks on the service level. We extend a middleware for mobile ad hoc networks to enable the remote access to personal multimedia content at home via a proper infrastructure and gateway. In a second step, we use this concept to enable the context-aware download of multimedia content to the mobile phone based on rules and a semantic blackboard approach.
{"title":"A Mobile Middleware Approach for the Convergence of Wide Area and Personal Area Networks","authors":"C. Jacob, Lei Zhang, A. Kress, S. Steglich, Tian Hui","doi":"10.1109/CCNC.2009.4784982","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784982","url":null,"abstract":"Evolving device capabilities and network technologies make the seamless combination of personal area and wide area networks capable and desirable to exploit advantages of each of the environments. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. \u0000 \u0000In this paper, we describe an approach that addresses the convergence of personal area and wide area networks on the service level. We extend a middleware for mobile ad hoc networks to enable the remote access to personal multimedia content at home via a proper infrastructure and gateway. In a second step, we use this concept to enable the context-aware download of multimedia content to the mobile phone based on rules and a semantic blackboard approach.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784993
Sung-Hyung Lee, Jae-Hyun Kim
This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication. We evaluate the safety of the proposed protocol by the security analysis and compare the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.
{"title":"Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism","authors":"Sung-Hyung Lee, Jae-Hyun Kim","doi":"10.1109/CCNC.2009.4784993","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784993","url":null,"abstract":"This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication. We evaluate the safety of the proposed protocol by the security analysis and compare the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}