Minimizing energy consumption is an important challenge in wireless sensor networks. The proposal of reactive on-demand philosophy where routes are established only when required is a major step. But it still needs to keep information about routes. The constantly changing topology, however, makes the routing state upkeep difficult. Thus multi-path routing is usually used for robust data delivery. But it is inefficient in terms of energy and bandwidth consumption especially for the slightly larger data packets such as in image/video dissemination. In this paper, we present a gradient-based routing protocol which works without knowledge of the existence of any neighboring nodes hence manifests the property of robust performance and eliminates the latency as well as the overhead of state upkeep. The data forwarding is based on the gradient -a cost field which provides each sensor node the minimum energy cost path to forward sensing data hence the energy consumption is further improved. Simulation studies show that our protocol is more energy-efficient than comparable work like GRAB and is as robust as its multi-path delivery.
{"title":"A Robust and Energy-Efficient Approach for Image/Video Dissemination in WSNs","authors":"Pei Huang, Xi Yang, Yongdong Tan","doi":"10.1109/CCNC08.2007.153","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.153","url":null,"abstract":"Minimizing energy consumption is an important challenge in wireless sensor networks. The proposal of reactive on-demand philosophy where routes are established only when required is a major step. But it still needs to keep information about routes. The constantly changing topology, however, makes the routing state upkeep difficult. Thus multi-path routing is usually used for robust data delivery. But it is inefficient in terms of energy and bandwidth consumption especially for the slightly larger data packets such as in image/video dissemination. In this paper, we present a gradient-based routing protocol which works without knowledge of the existence of any neighboring nodes hence manifests the property of robust performance and eliminates the latency as well as the overhead of state upkeep. The data forwarding is based on the gradient -a cost field which provides each sensor node the minimum energy cost path to forward sensing data hence the energy consumption is further improved. Simulation studies show that our protocol is more energy-efficient than comparable work like GRAB and is as robust as its multi-path delivery.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133094646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper propose adaptive noisy signal reduction method on smart devices for voice communication service in pervasive home environment. In order to reduce noisy signals efficiently on smart devices we provide Wiener filtering technique based on input-SNR estimation method with preprocessing on smart home devices.
{"title":"Adaptive Noise Reduction Algorithm on Smart Devices in Pervasive Home Environment for Voice Communication Service","authors":"Jinsul Kim, S. Han, Dongwook Lee, Minsoo Hahn","doi":"10.1109/CCNC08.2007.271","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.271","url":null,"abstract":"This paper propose adaptive noisy signal reduction method on smart devices for voice communication service in pervasive home environment. In order to reduce noisy signals efficiently on smart devices we provide Wiener filtering technique based on input-SNR estimation method with preprocessing on smart home devices.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122353228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By employing Bayesian neural network, a new QoS prediction algorithm for high speed packet access network has been developed. Network performances are evaluated based on a well developed call admission control scheme, namely the tri-threshold bandwidth reservation scheme. The algorithm helps to improve the resource management, thus saving the cost and bandwidth.
{"title":"QoS Prediction for High Speed Packet Access Networks","authors":"Yuting Sun, K. Tsang, H. Tung, K. L. Lam, K. Ko","doi":"10.1109/CCNC08.2007.182","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.182","url":null,"abstract":"By employing Bayesian neural network, a new QoS prediction algorithm for high speed packet access network has been developed. Network performances are evaluated based on a well developed call admission control scheme, namely the tri-threshold bandwidth reservation scheme. The algorithm helps to improve the resource management, thus saving the cost and bandwidth.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham
In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.
{"title":"Denial of Service Attacks Using Internet Key Exchange Protocol","authors":"Prashant Dewan, Divya Naidu Kolar Sunder, David M. Durham","doi":"10.1109/CCNC08.2007.111","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.111","url":null,"abstract":"In this paper we answer two questions: 1) How can an attacker push the CPU utilization of a state-of-art Internet Key Exchange (IKE) responders to 100% thereby inflecting a Denial of Service (DoS) attack and 2) What are the mitigation mechanisms that can be deployed on IP networks without modifying the protocol? We emulated the DoS attacks in our test lab. We outline our experiments and present the results.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122425096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High-Altitude Platform Station (HAPS) is one of the promising wireless communication infrastructures in the future. The major factor affecting its communication channel is environment. An accurate characterization of shadowing caused by the environment is needed for this new wireless infrastructure. This paper is, therefore, designed to address and evaluate the shadowing characteristics from urban physical structures for HAPS communications. Experiments are first conducted in urban areas of Japan and then we present the results of shadowing characteristics at various conditions in each specific area. Second, an analytical model is developed to evaluate the shadowing condition for HAPS channel based on the environmental characteristic data derived from the experimental areas and a geometrical model. Finally, comparisons between empirical studies and the analytical model are made. The comparison results show that the proposed analytical model is reliably practical in characterizing shadowing in urban areas by using the environmental statistical data and the geometrical model.
{"title":"Evaluations of Urban Shadowing Characteristics for HAPS Communications","authors":"Marry Kong, Otabek Yorkinov, S. Shimamoto","doi":"10.1109/CCNC08.2007.129","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.129","url":null,"abstract":"High-Altitude Platform Station (HAPS) is one of the promising wireless communication infrastructures in the future. The major factor affecting its communication channel is environment. An accurate characterization of shadowing caused by the environment is needed for this new wireless infrastructure. This paper is, therefore, designed to address and evaluate the shadowing characteristics from urban physical structures for HAPS communications. Experiments are first conducted in urban areas of Japan and then we present the results of shadowing characteristics at various conditions in each specific area. Second, an analytical model is developed to evaluate the shadowing condition for HAPS channel based on the environmental characteristic data derived from the experimental areas and a geometrical model. Finally, comparisons between empirical studies and the analytical model are made. The comparison results show that the proposed analytical model is reliably practical in characterizing shadowing in urban areas by using the environmental statistical data and the geometrical model.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Uhm, Zion Hwang, Minsoo Lee, Yong Kim, Sehyun Park
In smart home, people who use of context-aware systems should expect to be more dynamic and adaptive services by analyzing residents along with life styles. Currently, the research effort is focused on the service-oriented structure and ontology-based context model. However, the conventional model did not consider the classified service, service reconstruction and definition of service type by classified service patterns. In this paper, we propose a session manager which manages service registration states and classified service according to the user movements. Moreover, a session manager offers to analyze the service pattern by changing environments and user location. Our system could create the dynamic services according to service pattern analysis. Therefore, our system reduces the offered service delays and improves the maximum 64% performance of service response time compared with non-existence the session manager. We show the feasibility of our system by evaluating the efficiency on a test bed.
{"title":"Service Reconstruction for Improving Performance Using Classified Service Pattern and a Session Manager-Based Architecture in Smart Homes","authors":"Y. Uhm, Zion Hwang, Minsoo Lee, Yong Kim, Sehyun Park","doi":"10.1109/CCNC08.2007.79","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.79","url":null,"abstract":"In smart home, people who use of context-aware systems should expect to be more dynamic and adaptive services by analyzing residents along with life styles. Currently, the research effort is focused on the service-oriented structure and ontology-based context model. However, the conventional model did not consider the classified service, service reconstruction and definition of service type by classified service patterns. In this paper, we propose a session manager which manages service registration states and classified service according to the user movements. Moreover, a session manager offers to analyze the service pattern by changing environments and user location. Our system could create the dynamic services according to service pattern analysis. Therefore, our system reduces the offered service delays and improves the maximum 64% performance of service response time compared with non-existence the session manager. We show the feasibility of our system by evaluating the efficiency on a test bed.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123910493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Homes of the future will become increasingly networked with all kinds of devices and appliances connected together. Faults in such systems are frustrating for consumers and can be tricky to track down. This paper describes a prototype Fault Diagnosis System (FDS) that utilizes agents distributed across a home network, operating autonomously in the background and cooperatively exchanging information in order to identify the root causes of problems. The focus is on the use of an open architecture which employs OSGi Service Platforms to allow the dynamic extension of diagnostic capabilities to address new types of problem that may emerge with new types of device or application. The paper reviews the general benefits of an agent based approach and highlights the distinctive features of the FDS prototype which contribute to its open structure.
{"title":"An Open Diagnostic Infrastructure for Future Home Networks","authors":"P. Utton","doi":"10.1109/CCNC08.2007.77","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.77","url":null,"abstract":"Homes of the future will become increasingly networked with all kinds of devices and appliances connected together. Faults in such systems are frustrating for consumers and can be tricky to track down. This paper describes a prototype Fault Diagnosis System (FDS) that utilizes agents distributed across a home network, operating autonomously in the background and cooperatively exchanging information in order to identify the root causes of problems. The focus is on the use of an open architecture which employs OSGi Service Platforms to allow the dynamic extension of diagnostic capabilities to address new types of problem that may emerge with new types of device or application. The paper reviews the general benefits of an agent based approach and highlights the distinctive features of the FDS prototype which contribute to its open structure.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127655652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Here is to propose a demonstration of opportunistic wireless mesh networks for broadband wireless Internet access, supporting real-time services, e.g., of voice and video. The enabling technology is of the large-scale cognitive networking, which opportunistically utilizes network resources including both spectrum bandwidth and mesh radio (station) availability. We further demonstrate that: (1) vast saving in the deployment/planning costs of wireless mesh networks can be achieved by establishing fluid networks without predetermined topology; (2) Better (opportunistic) network resource utilization can be achieved to establish reliable communications over multiple wireless hops. The network performance therefore reaches its instantaneous maximum.
{"title":"Wireless Mesh Infrastructure for Ubiquitous Voice and Video","authors":"Liang Song, D. Hatzinakos, Xiaoyu Wang","doi":"10.1109/CCNC08.2007.302","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.302","url":null,"abstract":"Here is to propose a demonstration of opportunistic wireless mesh networks for broadband wireless Internet access, supporting real-time services, e.g., of voice and video. The enabling technology is of the large-scale cognitive networking, which opportunistically utilizes network resources including both spectrum bandwidth and mesh radio (station) availability. We further demonstrate that: (1) vast saving in the deployment/planning costs of wireless mesh networks can be achieved by establishing fluid networks without predetermined topology; (2) Better (opportunistic) network resource utilization can be achieved to establish reliable communications over multiple wireless hops. The network performance therefore reaches its instantaneous maximum.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While pull-based peer-to-peer (P2P) live streaming prevails in recent years, an important but less studied problem is security. To achieve security, confidentiality of the streaming data is essential and the corresponding key management scheme must scale well without degrading the system performance too much. In this paper, we thus propose P2P-SMP -a novel secure multicast protocol specifically designed for pull-based P2P live streaming -to achieve good reliability in key distribution and guarantee that the decryption key is received by legitimate peers before the corresponding encrypted streaming data even in dynamic P2P environments. Through extending the pull-based P2P live streaming protocol to distribute rekeying messages and further adopting a batch rekeying method, P2P-SMP dramatically reduces the communication and computing overhead in key distribution. The efficiency and reliability of P2P-SMP is evaluated through extensive simulations.
{"title":"Adding Confidentiality to Pull-Based Peer-to-Peer Live Streaming","authors":"Jian-Guang Luo, Jiang Zhang, Shiqiang Yang","doi":"10.1109/CCNC08.2007.117","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.117","url":null,"abstract":"While pull-based peer-to-peer (P2P) live streaming prevails in recent years, an important but less studied problem is security. To achieve security, confidentiality of the streaming data is essential and the corresponding key management scheme must scale well without degrading the system performance too much. In this paper, we thus propose P2P-SMP -a novel secure multicast protocol specifically designed for pull-based P2P live streaming -to achieve good reliability in key distribution and guarantee that the decryption key is received by legitimate peers before the corresponding encrypted streaming data even in dynamic P2P environments. Through extending the pull-based P2P live streaming protocol to distribute rekeying messages and further adopting a batch rekeying method, P2P-SMP dramatically reduces the communication and computing overhead in key distribution. The efficiency and reliability of P2P-SMP is evaluated through extensive simulations.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a demonstration proposal about an implementation of P2PSIP in the mobile networks. The implementation demonstrates establishment of SIP multimedia sessions between mobile phones with little or no need for centralized servers of any kind. It allows a mobile phone user to use standard phone UI to make voice calls using resources of P2P overlay. A mobile phone user may freely use standard call manager and contact list in a mobile phone. According to our knowledge, P2P SIP has not yet been demonstrated on a mobile platform by anyone.
{"title":"Demonstration of Peer-to-Peer Session Initiation Protocol (P2PSIP) in the Mobile Environment","authors":"Esko Kokkonen, Salman Baset, M. Matuszewski","doi":"10.1109/CCNC08.2007.277","DOIUrl":"https://doi.org/10.1109/CCNC08.2007.277","url":null,"abstract":"This paper presents a demonstration proposal about an implementation of P2PSIP in the mobile networks. The implementation demonstrates establishment of SIP multimedia sessions between mobile phones with little or no need for centralized servers of any kind. It allows a mobile phone user to use standard phone UI to make voice calls using resources of P2P overlay. A mobile phone user may freely use standard call manager and contact list in a mobile phone. According to our knowledge, P2P SIP has not yet been demonstrated on a mobile platform by anyone.","PeriodicalId":183858,"journal":{"name":"2008 5th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}