The network mobility basic support protocol is an extension of mobile IP that enables an entire network to change its attachment point to the Internet. However, it incurs high overhead on the network if a mobile router moves frequently. In this paper, therefore, we propose a paging extensions for network mobility in nested mobile networks. To minimize signaling overhead, in our proposal, an idle mobile router does not register when moving within a paging area in the nested mobile networks. The cost analysis presented in this paper shows that our proposal offers considerable performance advantages to existing network mobility scheme.
{"title":"Paging Extensions for Network Mobility in Nested Mobile Networks","authors":"Myung-Kyu Yi, Dae-Hee Myoung, Young-Kyu Yang","doi":"10.1109/CCNC08.2007.87","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.87","url":null,"abstract":"The network mobility basic support protocol is an extension of mobile IP that enables an entire network to change its attachment point to the Internet. However, it incurs high overhead on the network if a mobile router moves frequently. In this paper, therefore, we propose a paging extensions for network mobility in nested mobile networks. To minimize signaling overhead, in our proposal, an idle mobile router does not register when moving within a paging area in the nested mobile networks. The cost analysis presented in this paper shows that our proposal offers considerable performance advantages to existing network mobility scheme.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current paper presents ImplanTDT, a novel research project carried out in Murcia (Spain) to study the degree of knowledge and users' reaction to digital terrestrial television (DTT). Analogue terrestrial television (ATT) will definitely disappear in less than 3 years. The first stage of the project is centered on the design of two different and complementary test scenarios such as a usability laboratory and a real user bidirectional monitoring platform based on the development of advanced multimedia home platform (MHP) software applications. Results of this project stage, will serve to improve DTT information campaigns, develop more easy-to-use, useful and advanced interactive MHP services (T-Government, T-Learning, T-Commerce, etc.) and provide all involved parties with high quality information in order to achieve a balanced, interactive, educated and massive technological transition.
{"title":"ImplanTDT: Usability Laboratory, Real User DTT Monitoring Platform and MHP-Based Services","authors":"Rafael Melendreras-Ruiz","doi":"10.1109/CCNC08.2007.62","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.62","url":null,"abstract":"The current paper presents ImplanTDT, a novel research project carried out in Murcia (Spain) to study the degree of knowledge and users' reaction to digital terrestrial television (DTT). Analogue terrestrial television (ATT) will definitely disappear in less than 3 years. The first stage of the project is centered on the design of two different and complementary test scenarios such as a usability laboratory and a real user bidirectional monitoring platform based on the development of advanced multimedia home platform (MHP) software applications. Results of this project stage, will serve to improve DTT information campaigns, develop more easy-to-use, useful and advanced interactive MHP services (T-Government, T-Learning, T-Commerce, etc.) and provide all involved parties with high quality information in order to achieve a balanced, interactive, educated and massive technological transition.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127641900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Nurminen, J. Wikman, H. Kokkinen, P. Muilu, Markus Gronholm
We will demonstrate how an existing content management system, Drupal, can be used on a personal Web site that is running on a mobile phone. It allows users to easily create and configure a Web site to their mobile devices that is able to take advantage of the wide set of normal functionality of the content management system and the context and data of the mobile phone. We estimate that very easy creation of versatile mobile Web sites has potential to boost the development of innovative mobile applications.
{"title":"Drupal Content Management System on Mobile Phone","authors":"J. Nurminen, J. Wikman, H. Kokkinen, P. Muilu, Markus Gronholm","doi":"10.1109/CCNC08.2007.281","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.281","url":null,"abstract":"We will demonstrate how an existing content management system, Drupal, can be used on a personal Web site that is running on a mobile phone. It allows users to easily create and configure a Web site to their mobile devices that is able to take advantage of the wide set of normal functionality of the content management system and the context and data of the mobile phone. We estimate that very easy creation of versatile mobile Web sites has potential to boost the development of innovative mobile applications.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents different possibilities on using environment data in games. Instead of using synthetic environment data it is shown how to gather, process, store, and use real-life environment data for a more realistic game experience. Using environment data is not difficult but problems of heterogeneity, availability, quality, and volume of the data must be solved. Realistic environment data opens new possibilities for game design, but care must be taken not to give the environment changes too much control over the gameplay. A method for integrating environment data into a pervasive mobile phone game is shown. The adopted solution is simple, flexible, independent from any operator, and can be used for other applications.
{"title":"Designing and Creating Environment Aware Games","authors":"A. Becam, V. A. A. Nenonen","doi":"10.1109/CCNC08.2007.238","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.238","url":null,"abstract":"This paper presents different possibilities on using environment data in games. Instead of using synthetic environment data it is shown how to gather, process, store, and use real-life environment data for a more realistic game experience. Using environment data is not difficult but problems of heterogeneity, availability, quality, and volume of the data must be solved. Realistic environment data opens new possibilities for game design, but care must be taken not to give the environment changes too much control over the gameplay. A method for integrating environment data into a pervasive mobile phone game is shown. The adopted solution is simple, flexible, independent from any operator, and can be used for other applications.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"22 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114126392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometrics can be applied in existing systems for authentication with security, speed and ease of use. A wireless network is very suitable to incorporate biometrics into existing systems, and the integration requires reliable and efficient data routing within the system. Ant system is proposed to establish an adaptive route for data transmission among distributed nodes whilst maintaining the required bit error rate under varying channel conditions and consuming minimal energy. Face recognition is implemented in simulation to test the robustness and energy consumption of the biometric system within a wireless framework, and the results show that ant system based routing is efficient and as robust as a wired system, and there is no extra hardware needed to implement the routing.
{"title":"Ant System Based Flexible and Cost Effective Routing for Wireless Face Recognition","authors":"Yanjun Yan, R. Muraleedharan, L. Osadciw","doi":"10.1109/CCNC08.2007.155","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.155","url":null,"abstract":"Biometrics can be applied in existing systems for authentication with security, speed and ease of use. A wireless network is very suitable to incorporate biometrics into existing systems, and the integration requires reliable and efficient data routing within the system. Ant system is proposed to establish an adaptive route for data transmission among distributed nodes whilst maintaining the required bit error rate under varying channel conditions and consuming minimal energy. Face recognition is implemented in simulation to test the robustness and energy consumption of the biometric system within a wireless framework, and the results show that ant system based routing is efficient and as robust as a wired system, and there is no extra hardware needed to implement the routing.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless mesh networks can provide for attractive solutions to telecommunication services, where cost-effective broadband access can be realized, by means of frequency reuse and lower engineering cost in installing. A novel network architecture of opportunistic mesh networks is presented here, based upon the cognitive networking concept which opportunistically utilizes the network resources including both spectrum bandwidth and mesh station availability. The proof-of-concept prototypes are developed to show: (1) the supportance of real-time traffic over multiple wireless hops by the opportunistic resource utilization; (2) the drop-and-play networking model which can vastly save the network planning/deployment costs.
{"title":"Prototypes of Opportunistic Wireless Mesh Networks Supporting Real-Time Services","authors":"Liang Song, D. Hatzinakos","doi":"10.1109/CCNC08.2007.92","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.92","url":null,"abstract":"Wireless mesh networks can provide for attractive solutions to telecommunication services, where cost-effective broadband access can be realized, by means of frequency reuse and lower engineering cost in installing. A novel network architecture of opportunistic mesh networks is presented here, based upon the cognitive networking concept which opportunistically utilizes the network resources including both spectrum bandwidth and mesh station availability. The proof-of-concept prototypes are developed to show: (1) the supportance of real-time traffic over multiple wireless hops by the opportunistic resource utilization; (2) the drop-and-play networking model which can vastly save the network planning/deployment costs.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pure peer-to-peer communication, such as voice over IP (VoIP), cannot rely on third parties on security. ZRTP is a solution for real-time peer-to-peer communication security problems, relying on Diffie-Hellman key exchange and short authentication strings (SAS). The demonstration shows how ZRTP is used with mobile phones, with only minor changes to the normal phone UI.
纯点对点通信,如VoIP (voice over IP),在安全性上不能依赖第三方。ZRTP是实时点对点通信安全问题的解决方案,依赖于Diffie-Hellman密钥交换和短身份验证字符串(SAS)。该演示展示了如何在移动电话上使用ZRTP,仅对正常的电话UI进行了微小的更改。
{"title":"Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP","authors":"Esko Kokkonen, M. Matuszewski","doi":"10.1109/CCNC08.2007.294","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.294","url":null,"abstract":"Pure peer-to-peer communication, such as voice over IP (VoIP), cannot rely on third parties on security. ZRTP is a solution for real-time peer-to-peer communication security problems, relying on Diffie-Hellman key exchange and short authentication strings (SAS). The demonstration shows how ZRTP is used with mobile phones, with only minor changes to the normal phone UI.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radio frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this work we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her control, authenticate requests, release tags, transfer them to new owners, and so on. This is the first framework that unifies previous attempts and presents detailed protocols for all the operations required in such a proxy environment.
{"title":"Proxy Framework for Enhanced RFID Security and Privacy","authors":"T. Dimitriou","doi":"10.1109/CCNC08.2007.197","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.197","url":null,"abstract":"Radio frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this work we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her control, authenticate requests, release tags, transfer them to new owners, and so on. This is the first framework that unifies previous attempts and presents detailed protocols for all the operations required in such a proxy environment.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an algorithm managing the end-to-end video distortion of all users in multiuser orthogonal frequency division multiplex (OFDM) systems. The proposed algorithm mainly exploits the unequal importance of transmitted video packets and the diversity of multiuser existing in sub-carriers. We firstly induce model based rate-distortion function for measuring the amount of video quality degradation which a video packet affects in a group of picture (GOP). Based on the information of distortion in a packet to be transmitted, we propose the distortion management algorithm to allocate resources to users by balancing the subcarriers and power usages. Compared to the previous TDMA, simulation results show that substantial improvements of video quality are achieved.
{"title":"Distortion Management Scheme for Multiuser Video Transmission in OFDM Systems","authors":"H. Ha, Changhoon Yim, Y. Kim","doi":"10.1109/CCNC08.2007.184","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.184","url":null,"abstract":"This paper proposes an algorithm managing the end-to-end video distortion of all users in multiuser orthogonal frequency division multiplex (OFDM) systems. The proposed algorithm mainly exploits the unequal importance of transmitted video packets and the diversity of multiuser existing in sub-carriers. We firstly induce model based rate-distortion function for measuring the amount of video quality degradation which a video packet affects in a group of picture (GOP). Based on the information of distortion in a packet to be transmitted, we propose the distortion management algorithm to allocate resources to users by balancing the subcarriers and power usages. Compared to the previous TDMA, simulation results show that substantial improvements of video quality are achieved.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122630193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Internet Protocol Television (IPTV) systems, Quality-of-Service (QoS) is a critical factor for the user satisfaction. In this paper, we first propose a queueing model for IPTV systems and discuss how to ensure the QoS of IPTV. We then use the model to analyze the effects of IPTV traffic on other applications in home networks. We find that TCP congestion control may not work well under this circumstance and propose a new approach to improve the performance of TCP. We also verify our results through ns2 simulations.
{"title":"On the QoS of IPTV and its Effects on Home Networks","authors":"D. Qiu","doi":"10.1155/2010/253495","DOIUrl":"https://doi.org/10.1155/2010/253495","url":null,"abstract":"In Internet Protocol Television (IPTV) systems, Quality-of-Service (QoS) is a critical factor for the user satisfaction. In this paper, we first propose a queueing model for IPTV systems and discuss how to ensure the QoS of IPTV. We then use the model to analyze the effects of IPTV traffic on other applications in home networks. We find that TCP congestion control may not work well under this circumstance and propose a new approach to improve the performance of TCP. We also verify our results through ns2 simulations.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}