Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.
{"title":"A Dynamic Network Access Identifier Used for Location Privacy","authors":"C. Wan, A. Hu","doi":"10.1109/FGCN.2007.10","DOIUrl":"https://doi.org/10.1109/FGCN.2007.10","url":null,"abstract":"Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The performance of a cooperative communication wireless network with a single relay system is studied over Nakagami-m fading channels. The simplest Alamouti space-time block code is transmitted through an amplify- and-forward (AF) relay terminal in a two-hop network. The exact symbol error rates (SER) are analyzed using the moment generating function (MGF) of the total signal to noise ratio (SNR) for a particular signal in the case of M-ary phase shift keying (M-PSK) modulation schemes. Subsequently, numerical and simulation results are provided to verify the accuracy of the formulation.
{"title":"Performance Evaluation of Alamouti STC through Amplify-Forward Cooperative Relay Network over Nakagami-m Fading Channels","authors":"S. Atapattu, Nandana Rajatheva","doi":"10.1109/FGCN.2007.181","DOIUrl":"https://doi.org/10.1109/FGCN.2007.181","url":null,"abstract":"The performance of a cooperative communication wireless network with a single relay system is studied over Nakagami-m fading channels. The simplest Alamouti space-time block code is transmitted through an amplify- and-forward (AF) relay terminal in a two-hop network. The exact symbol error rates (SER) are analyzed using the moment generating function (MGF) of the total signal to noise ratio (SNR) for a particular signal in the case of M-ary phase shift keying (M-PSK) modulation schemes. Subsequently, numerical and simulation results are provided to verify the accuracy of the formulation.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Careless development of Web applications has often caused occurrence of new Web-based attacks. The signature-based intrusion detection system cannot detect these attacks as it seems to lack the capability to deal with such various new intrusions. As a result, it is necessary to research and develop new types of detection methods that can detect new intrusions as well as protect the system from previous well-known attacks. In this paper, we propose a web anomaly detection system. This system can detect suspicious Web traffic using an HTTP traffic pattern analysis and the URI field information analysis of the HTTP packet. We also demonstrate the feasibility of the proposed system by implementing the system and showing some reasonable results.
{"title":"Web Anomaly Detection System for Mobile Web Client","authors":"Sung-Min Jang, Yoo-Hun Won","doi":"10.1109/FGCN.2007.232","DOIUrl":"https://doi.org/10.1109/FGCN.2007.232","url":null,"abstract":"Careless development of Web applications has often caused occurrence of new Web-based attacks. The signature-based intrusion detection system cannot detect these attacks as it seems to lack the capability to deal with such various new intrusions. As a result, it is necessary to research and develop new types of detection methods that can detect new intrusions as well as protect the system from previous well-known attacks. In this paper, we propose a web anomaly detection system. This system can detect suspicious Web traffic using an HTTP traffic pattern analysis and the URI field information analysis of the HTTP packet. We also demonstrate the feasibility of the proposed system by implementing the system and showing some reasonable results.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114572723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang
Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.
{"title":"Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks","authors":"G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang","doi":"10.1109/FGCN.2007.108","DOIUrl":"https://doi.org/10.1109/FGCN.2007.108","url":null,"abstract":"Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huansheng Ning, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang
The development for Internet of Things and RFID technology is described in this paper. A feasible scheme and layered structure is proposed for Internet of Things. Its management is presented according to the demand for Internet of Things in China. The general system contains two parts: computer information subsystem and RFID terminal subsystem, the latter of which is the main focus. The management protocol for Internet of Things explored in the paper includes SNMP and RFID managing protocol (RFID- MP).
{"title":"Layered Structure and Management in Internet of Things","authors":"Huansheng Ning, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang","doi":"10.1109/FGCN.2007.158","DOIUrl":"https://doi.org/10.1109/FGCN.2007.158","url":null,"abstract":"The development for Internet of Things and RFID technology is described in this paper. A feasible scheme and layered structure is proposed for Internet of Things. Its management is presented according to the demand for Internet of Things in China. The general system contains two parts: computer information subsystem and RFID terminal subsystem, the latter of which is the main focus. The management protocol for Internet of Things explored in the paper includes SNMP and RFID managing protocol (RFID- MP).","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a new storage system architecture called as U-Storage (ubiquitous storage system). U-Storage allows a user to access an on-line storage with any type of information devices that are able to connect to Internet. The on-line storage is virtualized to the user's information devices as a local hard disk or a memory card by our U-Storage. With devices supporting U-Storage, users can read and write their data anytime and anywhere without downloading and uploading operation.
{"title":"U-Storage: A New On-line Storage System for Ubiquitous Environment","authors":"Seokil Song, Y. Kwak","doi":"10.1109/FGCN.2007.227","DOIUrl":"https://doi.org/10.1109/FGCN.2007.227","url":null,"abstract":"In this paper, we propose a new storage system architecture called as U-Storage (ubiquitous storage system). U-Storage allows a user to access an on-line storage with any type of information devices that are able to connect to Internet. The on-line storage is virtualized to the user's information devices as a local hard disk or a memory card by our U-Storage. With devices supporting U-Storage, users can read and write their data anytime and anywhere without downloading and uploading operation.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.
{"title":"An Empirical Study of Spam and Spam Vulnerable email Accounts","authors":"B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee","doi":"10.1109/FGCN.2007.61","DOIUrl":"https://doi.org/10.1109/FGCN.2007.61","url":null,"abstract":"Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.
{"title":"A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver","authors":"Jisu Jiang, C. Law, Chao Fang","doi":"10.1109/FGCN.2007.26","DOIUrl":"https://doi.org/10.1109/FGCN.2007.26","url":null,"abstract":"Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.
{"title":"Role of Annotation in Electronic Process Guide (EPG)","authors":"A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/FGCN.2007.196","DOIUrl":"https://doi.org/10.1109/FGCN.2007.196","url":null,"abstract":"Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an adaptive application-specific cooperative relaying mechanism for delivering layered coded multimedia data over wireless sensor networks. The proposed approach is to optimally map source data layers of different perceptual importance to relay nodes, so that the most important data layer can be transmitted in high quality. Each relay node only needs to detect and forward the assigned sub-streams (layers) of multimedia data. The distinctive benefit of this approach is to minimize the video distortion induced by buffer overflow and delay violation, while reducing transmission processing requirements on each relay node and providing significant savings in transmit and receive energy. Experimental results show that, compared with other cooperative methods, the proposed algorithm achieves significant performance improvement.
{"title":"Adaptive Application-specific Cooperative Relay for Wireless Video Sensor Networks","authors":"Xiaoli Wang, Daqing Gu, Tao Shu","doi":"10.1109/FGCN.2007.49","DOIUrl":"https://doi.org/10.1109/FGCN.2007.49","url":null,"abstract":"In this paper, we propose an adaptive application-specific cooperative relaying mechanism for delivering layered coded multimedia data over wireless sensor networks. The proposed approach is to optimally map source data layers of different perceptual importance to relay nodes, so that the most important data layer can be transmitted in high quality. Each relay node only needs to detect and forward the assigned sub-streams (layers) of multimedia data. The distinctive benefit of this approach is to minimize the video distortion induced by buffer overflow and delay violation, while reducing transmission processing requirements on each relay node and providing significant savings in transmit and receive energy. Experimental results show that, compared with other cooperative methods, the proposed algorithm achieves significant performance improvement.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}