首页 > 最新文献

2009 6th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
Basic Design of a User-Driven Service Creation Platform Assisted by Cellular Systems 蜂窝系统辅助下用户驱动服务创建平台的基本设计
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784980
Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi
In spite of recent advances of personal communication devices and access network technology, users are still facing the issues such as high device maintenance costs, complication of inter-device cooperation, illegal access to devices, and leakage of personal information. Consequently, it is difficult for users to securely construct a network with local as well as remote personal devices. We propose a User-driven Service Creation Platform (USCP), which enables users to construct a secure private network in a simple and intuitive way, making the most of the authentication mechanism in cellular networks. USCP separates signaling and data paths in a flat structure of a virtual network topology. In this paper, we describe the basic design of USCP.
尽管近年来个人通信设备和接入网技术不断进步,但用户仍然面临着设备维护成本高、设备间合作复杂、非法访问设备、个人信息泄露等问题。因此,用户很难安全地使用本地和远程个人设备构建网络。我们提出了一个用户驱动的服务创建平台(User-driven Service Creation Platform, USCP),使用户能够以简单直观的方式构建安全的专用网,充分利用蜂窝网络中的认证机制。USCP在虚拟网络拓扑的平面结构中分离信令和数据路径。本文描述了USCP的基本设计。
{"title":"Basic Design of a User-Driven Service Creation Platform Assisted by Cellular Systems","authors":"Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi","doi":"10.1109/CCNC.2009.4784980","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784980","url":null,"abstract":"In spite of recent advances of personal communication devices and access network technology, users are still facing the issues such as high device maintenance costs, complication of inter-device cooperation, illegal access to devices, and leakage of personal information. Consequently, it is difficult for users to securely construct a network with local as well as remote personal devices. We propose a User-driven Service Creation Platform (USCP), which enables users to construct a secure private network in a simple and intuitive way, making the most of the authentication mechanism in cellular networks. USCP separates signaling and data paths in a flat structure of a virtual network topology. In this paper, we describe the basic design of USCP.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing Human Centric Data for Sharing Mobile Internet with Social Buddies 分析以人为中心的数据,与社交伙伴共享移动互联网
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784864
S. Gurumurthy, A. Ganz
We propose a middleware called BuddyShare to automatically form an overlay group of nearby friends' mobile phones to collaboratively download data by sharing mobile internet. This system is hypothetical in nature and only work on certain assumptions such as: 1) frequent availability of friends' phone nearby, 2) Sufficient social trust among physically close users to share internet and 3) sufficient social networking information available in phones. In order to validate these hypotheses, we collected human centric dataset of cellular phone users of university environment to study the user behavior. In this paper, we present certain social and proximity behaviors of these users that validate these hypotheses and show the practical feasibility of a BuddyShare system. We also study the usefulness of BuddyShare by virtually leveraging it on this user network, which concludes around three times scaling in download rate on average.
我们提出了一种名为BuddyShare的中间件,通过共享移动互联网,将附近朋友的手机自动组成一个覆盖组,协同下载数据。这个系统本质上是假设的,只适用于某些假设,例如:1)附近朋友的手机经常可用,2)物理距离近的用户之间有足够的社会信任来共享互联网,3)手机中有足够的社交网络信息。为了验证这些假设,我们收集了大学环境下手机用户的以人为中心的数据集来研究用户行为。在本文中,我们展示了这些用户的某些社交和接近行为,验证了这些假设,并展示了BuddyShare系统的实际可行性。我们还研究了BuddyShare的实用性,通过虚拟地利用它在这个用户网络上,得出的结论是,平均下载速率增加了三倍左右。
{"title":"Analyzing Human Centric Data for Sharing Mobile Internet with Social Buddies","authors":"S. Gurumurthy, A. Ganz","doi":"10.1109/CCNC.2009.4784864","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784864","url":null,"abstract":"We propose a middleware called BuddyShare to automatically form an overlay group of nearby friends' mobile phones to collaboratively download data by sharing mobile internet. This system is hypothetical in nature and only work on certain assumptions such as: 1) frequent availability of friends' phone nearby, 2) Sufficient social trust among physically close users to share internet and 3) sufficient social networking information available in phones. In order to validate these hypotheses, we collected human centric dataset of cellular phone users of university environment to study the user behavior. In this paper, we present certain social and proximity behaviors of these users that validate these hypotheses and show the practical feasibility of a BuddyShare system. We also study the usefulness of BuddyShare by virtually leveraging it on this user network, which concludes around three times scaling in download rate on average.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Statistical Approach to Cheating Countermeasure in P2P MOGs P2P网络游戏作弊对策的统计方法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784965
S. Ferretti, M. Roccetti, Roberta Zioni
Detecting cheaters in peer-to-peer Multiplayer On-line Games (MOGs) may be more effective than avoiding the cheats. This is particularly true for fast paced, real-time MOGs, since the classic approaches to prevent time cheats usually complicate the communication protocols among peers. This results in a loss of responsiveness among players during the game session. We present a cheating detection scheme, named AC/DC (Algorithm for Cheating Detection by Cheating), that faces a specific time cheat, i.e., the look-ahead cheat. The idea is that of exploiting a counterattack approach to determine if the suspected node waits for messages coming from other peers before generating its cheated events. During the counterattack, the controlling node delays the transmission of newly generated events to the suspected node. This allows to determine if the suspected node waits for these events before generating its own ones. In this paper, a novel version of the AC/DC approach is presented which exploits a control scheme that measures the statistical correlation between the additional delay employed by the controlling peer and the network latencies from the controlled peer. Simulation results confirm the viability of the approach.
在点对点多人在线游戏(mog)中发现作弊者可能比避免作弊者更有效。对于快节奏的实时mog来说尤其如此,因为防止时间作弊的经典方法通常会使对等体之间的通信协议复杂化。这将导致玩家在游戏过程中失去响应性。我们提出了一种作弊检测方案,命名为AC/DC (Algorithm for cheating detection by cheating),该方案面对特定的时间作弊,即向前看作弊。其思想是利用一种反击方法来确定可疑节点在生成其被欺骗的事件之前是否等待来自其他对等节点的消息。在反击过程中,控制节点将新生成的事件延迟发送到可疑节点。这允许确定可疑节点在生成自己的事件之前是否等待这些事件。本文提出了一种新的AC/DC方法,该方法利用一种控制方案来测量控制对等体使用的额外延迟与被控制对等体的网络延迟之间的统计相关性。仿真结果验证了该方法的可行性。
{"title":"A Statistical Approach to Cheating Countermeasure in P2P MOGs","authors":"S. Ferretti, M. Roccetti, Roberta Zioni","doi":"10.1109/CCNC.2009.4784965","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784965","url":null,"abstract":"Detecting cheaters in peer-to-peer Multiplayer On-line Games (MOGs) may be more effective than avoiding the cheats. This is particularly true for fast paced, real-time MOGs, since the classic approaches to prevent time cheats usually complicate the communication protocols among peers. This results in a loss of responsiveness among players during the game session. We present a cheating detection scheme, named AC/DC (Algorithm for Cheating Detection by Cheating), that faces a specific time cheat, i.e., the look-ahead cheat. The idea is that of exploiting a counterattack approach to determine if the suspected node waits for messages coming from other peers before generating its cheated events. During the counterattack, the controlling node delays the transmission of newly generated events to the suspected node. This allows to determine if the suspected node waits for these events before generating its own ones. In this paper, a novel version of the AC/DC approach is presented which exploits a control scheme that measures the statistical correlation between the additional delay employed by the controlling peer and the network latencies from the controlled peer. Simulation results confirm the viability of the approach.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Optimistic Unchoking Algorithm for BitTorrent 一种新的乐观解噎算法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784859
Zuhui Ma, D. Qiu
Optimistic unchoking plays an important role in BitTorrent Peer-to-Peer (P2P) file sharing networks. Peers use optimistic unchoking to find upload bandwidth information about their neighbors. However, free-riders can also take advantage of optimistic unchoking and download from the network without uploading anything. In this paper, we propose a novel optimistic unchoking algorithm for BitTorrent. The main purposes of our algorithm are to prevent free-riding and to improve the efficiency of optimistic unchoking. We then propose a stochastic model to analyze the performance of our algorithm. We also verify the results by simulations. Both theoretical and simulation results show that our algorithm can effectively prevent free-riding and significantly improve the download rate of normal peers at the same time.
乐观解禁在BitTorrent P2P文件共享网络中起着重要的作用。对等体使用乐观解噎来查找邻居的上传带宽信息。然而,搭便车者也可以利用乐观的解禁,从网络上下载而不上传任何内容。本文提出了一种新的乐观解噎算法。我们的算法的主要目的是防止搭便车和提高乐观疏通的效率。然后我们提出了一个随机模型来分析我们的算法的性能。并通过仿真对结果进行了验证。理论和仿真结果表明,该算法可以有效地防止搭便车,同时显著提高正常节点的下载速率。
{"title":"A Novel Optimistic Unchoking Algorithm for BitTorrent","authors":"Zuhui Ma, D. Qiu","doi":"10.1109/CCNC.2009.4784859","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784859","url":null,"abstract":"Optimistic unchoking plays an important role in BitTorrent Peer-to-Peer (P2P) file sharing networks. Peers use optimistic unchoking to find upload bandwidth information about their neighbors. However, free-riders can also take advantage of optimistic unchoking and download from the network without uploading anything. In this paper, we propose a novel optimistic unchoking algorithm for BitTorrent. The main purposes of our algorithm are to prevent free-riding and to improve the efficiency of optimistic unchoking. We then propose a stochastic model to analyze the performance of our algorithm. We also verify the results by simulations. Both theoretical and simulation results show that our algorithm can effectively prevent free-riding and significantly improve the download rate of normal peers at the same time.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"341 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Mobile Middleware Approach for the Convergence of Wide Area and Personal Area Networks 一种用于广域网和个人局域网融合的移动中间件方法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784982
C. Jacob, Lei Zhang, A. Kress, S. Steglich, Tian Hui
Evolving device capabilities and network technologies make the seamless combination of personal area and wide area networks capable and desirable to exploit advantages of each of the environments. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. In this paper, we describe an approach that addresses the convergence of personal area and wide area networks on the service level. We extend a middleware for mobile ad hoc networks to enable the remote access to personal multimedia content at home via a proper infrastructure and gateway. In a second step, we use this concept to enable the context-aware download of multimedia content to the mobile phone based on rules and a semantic blackboard approach.
不断发展的设备功能和网络技术使个人区域和广域网能够无缝结合,并期望利用每种环境的优势。通过这种方式,自适应和上下文感知的服务提供成为可能,并为普及计算提供了新的机会。在本文中,我们描述了一种在服务水平上解决个人局域网和广域网融合的方法。我们扩展了移动自组织网络的中间件,使其能够通过适当的基础设施和网关远程访问家中的个人多媒体内容。在第二步中,我们使用这个概念,基于规则和语义黑板方法,使多媒体内容的上下文感知下载到手机。
{"title":"A Mobile Middleware Approach for the Convergence of Wide Area and Personal Area Networks","authors":"C. Jacob, Lei Zhang, A. Kress, S. Steglich, Tian Hui","doi":"10.1109/CCNC.2009.4784982","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784982","url":null,"abstract":"Evolving device capabilities and network technologies make the seamless combination of personal area and wide area networks capable and desirable to exploit advantages of each of the environments. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. \u0000 \u0000In this paper, we describe an approach that addresses the convergence of personal area and wide area networks on the service level. We extend a middleware for mobile ad hoc networks to enable the remote access to personal multimedia content at home via a proper infrastructure and gateway. In a second step, we use this concept to enable the context-aware download of multimedia content to the mobile phone based on rules and a semantic blackboard approach.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism 基于预认证机制的LR-WPAN认证协议设计
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784993
Sung-Hyung Lee, Jae-Hyun Kim
This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication. We evaluate the safety of the proposed protocol by the security analysis and compare the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.
本文提出了一种新的LR-WPAN认证协议。为了保证协议的可靠性和安全性,该协议采用了层次认证。此外,为了减少拒绝服务攻击的影响,该协议在信任中心和连接设备之间进行身份验证之前,先在父路由器和连接设备之间进行身份验证。此外,该协议通过减少身份验证期间的消息交换数量来减少身份验证延迟。通过安全性分析对所提出协议的安全性进行了评价,并比较了在发生拒绝服务攻击时ZigBee认证协议与所提出协议的消息交换次数。同时分析了两种协议的实现对连接设备认证延迟的影响。实验结果表明,该协议有效地保护了网络免受拒绝服务攻击,并且随着跳数的增加,连接设备的认证时间最多减少了30%。
{"title":"Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism","authors":"Sung-Hyung Lee, Jae-Hyun Kim","doi":"10.1109/CCNC.2009.4784993","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784993","url":null,"abstract":"This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication. We evaluate the safety of the proposed protocol by the security analysis and compare the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Window Design for SISO and MIMO OFDM Systems SISO和MIMO OFDM系统的窗口设计
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784841
Tseng-Wen Feng, B. Williams, Pao-Chu Wang, Shyh-Kang Jeng
In this paper, we conduct the window design for single-input single-output (SISO) and multiple-input multiple-output (MIMO) OFDM systems. The key value of this paper is to optimize the receiver SINR when carrier frequency offset (CFO) and phase noise both affecting an OFDM system. To our best knowledge, this is the first research to design window coefficients through leveraging the CFO and phase noise statistics for SISO and MIMO OFDM systems over frequency-selective channels. CFO and phase noise will destroy the orthogonality of OFDM system and lead to inter-carrier interference (ICI). Simulation results show that our proposed method can improve the system performance.
本文对单输入单输出(SISO)和多输入多输出(MIMO) OFDM系统进行了窗口设计。在载波频偏和相位噪声同时影响OFDM系统的情况下,优化接收机信噪比是本文研究的重点。据我们所知,这是第一个通过利用CFO和相位噪声统计来设计窗口系数的研究,用于频率选择信道上的SISO和MIMO OFDM系统。相位噪声和相位噪声会破坏OFDM系统的正交性,导致载波间干扰。仿真结果表明,该方法可以提高系统的性能。
{"title":"Window Design for SISO and MIMO OFDM Systems","authors":"Tseng-Wen Feng, B. Williams, Pao-Chu Wang, Shyh-Kang Jeng","doi":"10.1109/CCNC.2009.4784841","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784841","url":null,"abstract":"In this paper, we conduct the window design for single-input single-output (SISO) and multiple-input multiple-output (MIMO) OFDM systems. The key value of this paper is to optimize the receiver SINR when carrier frequency offset (CFO) and phase noise both affecting an OFDM system. To our best knowledge, this is the first research to design window coefficients through leveraging the CFO and phase noise statistics for SISO and MIMO OFDM systems over frequency-selective channels. CFO and phase noise will destroy the orthogonality of OFDM system and lead to inter-carrier interference (ICI). Simulation results show that our proposed method can improve the system performance.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131706266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BLINK: Securing Information to the Last Connection BLINK:将信息保护到最后一个连接
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784734
S. Craver, Yu Chen, Hao Chen, Jun Yu, I. M. Atakli
Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable--both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, we proposed a novel scheme called BLINK, which uses a reconfigurable hardware based decoder which operates on the link between a computer and its display. It moves the decryption outside the computer, preventing plaintext stealing, forwarding, screen capture and printing. Currently we are implementing the BLINK scheme on top of Altera FPGA board with Digital Visual Interface (DVI) ports, the correctness, effectiveness, and the performance will be evaluated through experiment.
健壮的密码学为对等体之间传输的信息提供机密性和完整性。然而,在接收者的计算机内存中解密的明文很容易受到端点监控和选择转发机密信息的用户的攻击。在本文中,我们提出了一种称为BLINK的新方案,该方案使用基于可重构硬件的解码器,该解码器在计算机与其显示器之间的链路上工作。它将解密移出计算机,防止明文窃取,转发,屏幕捕获和打印。目前,我们正在Altera FPGA板上实现带有数字视觉接口(DVI)端口的BLINK方案,并将通过实验来评估其正确性、有效性和性能。
{"title":"BLINK: Securing Information to the Last Connection","authors":"S. Craver, Yu Chen, Hao Chen, Jun Yu, I. M. Atakli","doi":"10.1109/CCNC.2009.4784734","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784734","url":null,"abstract":"Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable--both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, we proposed a novel scheme called BLINK, which uses a reconfigurable hardware based decoder which operates on the link between a computer and its display. It moves the decryption outside the computer, preventing plaintext stealing, forwarding, screen capture and printing. Currently we are implementing the BLINK scheme on top of Altera FPGA board with Digital Visual Interface (DVI) ports, the correctness, effectiveness, and the performance will be evaluated through experiment.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132176511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Bandwidth Assignment for Multiple Description Coding in Media Streaming 流媒体中多描述编码的最优带宽分配
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784710
Pengye Xia, Xing Jin, S. Chan
Multiple description coding (MDC) has been widely used in media streaming to address the bandwidth heterogeneity issue. That is, the video source encodes data into multiple descriptions. At the receiver end, the streaming quality is proportional to the number of descriptions received. In this paper, we investigate how to assign bandwidth for descriptions in order to make full use of available network bandwidth. We formulate the problem as an optimization problem. We then decompose the problem and address it by an iterative algorithm. We evaluate the algorithm through simulations. Our results show that arbitrary description rates may severely degrade system performance and an optimal solution can make efficient use of network bandwidth.
多描述编码(multi - description coding, MDC)被广泛应用于流媒体中,以解决带宽异构问题。即视频源将数据编码成多个描述。在接收端,流质量与接收到的描述数成正比。在本文中,我们研究了如何为描述分配带宽,以充分利用可用的网络带宽。我们把这个问题表述为最优化问题。然后我们分解问题并通过迭代算法解决它。我们通过仿真来评估算法。我们的研究结果表明,任意的描述速率可能会严重降低系统性能,而最优的解决方案可以有效地利用网络带宽。
{"title":"Optimal Bandwidth Assignment for Multiple Description Coding in Media Streaming","authors":"Pengye Xia, Xing Jin, S. Chan","doi":"10.1109/CCNC.2009.4784710","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784710","url":null,"abstract":"Multiple description coding (MDC) has been widely used in media streaming to address the bandwidth heterogeneity issue. That is, the video source encodes data into multiple descriptions. At the receiver end, the streaming quality is proportional to the number of descriptions received. In this paper, we investigate how to assign bandwidth for descriptions in order to make full use of available network bandwidth. We formulate the problem as an optimization problem. We then decompose the problem and address it by an iterative algorithm. We evaluate the algorithm through simulations. Our results show that arbitrary description rates may severely degrade system performance and an optimal solution can make efficient use of network bandwidth.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Piggyback Cooperative Repetition for Reliable Broadcasting of Safety Messages in VANETs 安全信息可靠广播的背驮式合作重复
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784944
Lin Yang, Jinhua Guo, Ying Wu
Vehicle safety communication applications require safety messages to be received by all the targeted vehicles within their lifetime. We propose a piggybacked cooperative repetition approach for reliably broadcasting safety messages in VANETs. Repetitions by neighbors that receive the original transmission can effectively cover the areas that are missed in the original transmissions. Moreover, the repetitions are piggybacked by the newly generated messages so that no extra messages are injected into the network. Our experiments show a significant performance improvement, achieving over 90% reception rate of safety messages at distances up to 200 meters to the sender.
车辆安全通信应用程序要求所有目标车辆在其使用寿命内接收安全信息。我们提出了一种在vanet中可靠地广播安全信息的承载式合作重复方法。接收到原始传输的邻居的重复可以有效地覆盖原始传输中遗漏的区域。此外,这些重复是由新生成的消息承载的,因此不会向网络中注入额外的消息。我们的实验显示了显著的性能改进,在距离发送者200米的距离上实现了超过90%的安全信息接收率。
{"title":"Piggyback Cooperative Repetition for Reliable Broadcasting of Safety Messages in VANETs","authors":"Lin Yang, Jinhua Guo, Ying Wu","doi":"10.1109/CCNC.2009.4784944","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784944","url":null,"abstract":"Vehicle safety communication applications require safety messages to be received by all the targeted vehicles within their lifetime. We propose a piggybacked cooperative repetition approach for reliably broadcasting safety messages in VANETs. Repetitions by neighbors that receive the original transmission can effectively cover the areas that are missed in the original transmissions. Moreover, the repetitions are piggybacked by the newly generated messages so that no extra messages are injected into the network. Our experiments show a significant performance improvement, achieving over 90% reception rate of safety messages at distances up to 200 meters to the sender.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
2009 6th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1