Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.
{"title":"A Dynamic Network Access Identifier Used for Location Privacy","authors":"C. Wan, A. Hu","doi":"10.1109/FGCN.2007.10","DOIUrl":"https://doi.org/10.1109/FGCN.2007.10","url":null,"abstract":"Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.
{"title":"Role of Annotation in Electronic Process Guide (EPG)","authors":"A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/FGCN.2007.196","DOIUrl":"https://doi.org/10.1109/FGCN.2007.196","url":null,"abstract":"Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.
{"title":"An Empirical Study of Spam and Spam Vulnerable email Accounts","authors":"B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee","doi":"10.1109/FGCN.2007.61","DOIUrl":"https://doi.org/10.1109/FGCN.2007.61","url":null,"abstract":"Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the next generation of wireless networks, mobile users should move across various access technologies, using multi-interface terminals and different types of services. The most important issue in such heterogeneous environment is the always best connected (ABC) concept. It allows the best connectivity to services anywhere at anytime. For that, a seamless inter-system handover solution is needed. In our paper, we propose an intelligent solution, based on the context-awareness concept, ensuring service continuity and answering user requirements. We focus on the vertical handover decision issue. It performs whether and over which access network to hand over among those available. It uses advanced decision algorithms (for more efficiency and intelligence) and it is governed by handover policies as decision rules (for more flexibility and optimization).
{"title":"Architecture of an Intelligent Inter-system Handover Management Scheme","authors":"Meriem Kassar, B. Kervella, G. Pujolle","doi":"10.1109/FGCN.2007.70","DOIUrl":"https://doi.org/10.1109/FGCN.2007.70","url":null,"abstract":"In the next generation of wireless networks, mobile users should move across various access technologies, using multi-interface terminals and different types of services. The most important issue in such heterogeneous environment is the always best connected (ABC) concept. It allows the best connectivity to services anywhere at anytime. For that, a seamless inter-system handover solution is needed. In our paper, we propose an intelligent solution, based on the context-awareness concept, ensuring service continuity and answering user requirements. We focus on the vertical handover decision issue. It performs whether and over which access network to hand over among those available. It uses advanced decision algorithms (for more efficiency and intelligence) and it is governed by handover policies as decision rules (for more flexibility and optimization).","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang
Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.
{"title":"Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks","authors":"G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang","doi":"10.1109/FGCN.2007.108","DOIUrl":"https://doi.org/10.1109/FGCN.2007.108","url":null,"abstract":"Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, multiple receive antennas are applied to multi-user binary pulse amplitude modulation (2PAM) time hopping (TH) ultra-wideband (UWB) systems to achieve high-data-rate communications. The effects of spatial diversity on the performance of 2PAM-TH-UWB systems are analytically investigated. We derive the expression for the received SINR after spatially combining and evaluate the bit error rate (BER) performance. Numerical results show that the BER performance can be enhanced by spatial diversity combining.
{"title":"Error Performance Analysis of Multi-User Binary PAM TH UWB Systems with Multiple Receive Antennas","authors":"Sunyoung Baek, J. An, Sungsin Lee, Sangchoon Kim","doi":"10.1109/FGCN.2007.118","DOIUrl":"https://doi.org/10.1109/FGCN.2007.118","url":null,"abstract":"In this paper, multiple receive antennas are applied to multi-user binary pulse amplitude modulation (2PAM) time hopping (TH) ultra-wideband (UWB) systems to achieve high-data-rate communications. The effects of spatial diversity on the performance of 2PAM-TH-UWB systems are analytically investigated. We derive the expression for the received SINR after spatially combining and evaluate the bit error rate (BER) performance. Numerical results show that the BER performance can be enhanced by spatial diversity combining.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new decoding method based on IR_HARQ scheme that uses rate-compatible LDPC codes as the FEC codes. And it can use the former decoding result, which can improve the performance of decoding scheme. This paper also evaluates the new decoding method by simulation. The results show that better performance both on system throughput and iterative times can be obtained.
{"title":"The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes","authors":"Shuya Yang, Hong Wen, Ning He, Liang Zhou","doi":"10.1109/FGCN.2007.214","DOIUrl":"https://doi.org/10.1109/FGCN.2007.214","url":null,"abstract":"This paper proposes a new decoding method based on IR_HARQ scheme that uses rate-compatible LDPC codes as the FEC codes. And it can use the former decoding result, which can improve the performance of decoding scheme. This paper also evaluates the new decoding method by simulation. The results show that better performance both on system throughput and iterative times can be obtained.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile IP is a protocol that supports the IP mobility of mobile nodes. However, the protocol has the triangular routing problem. Although many routing optimization extension schemes in IPv6 networks can solve the problem, the delivery of routing optimization messages in the handoff period may incur long transmission delay and message loss, and therefore degrade the performance of routing optimization mechanisms. In addition, all schemes require all mobile nodes and their correspondent nodes to be involved in mobility management. A mobile node must inform its correspondent node of its roaming and its new location address. In this paper, we exploit the domain name system (DNS) to develop a mobility management system. Except granting the access to a new wireless link after roaming, the mobility management is transparent for a mobile node and its correspondent node. No routing optimization message is delivered.
{"title":"Transparent IP Mobility Management","authors":"Huai-Jen Liu, Chih-Hao Wang, Chih-Lin Tseng","doi":"10.1109/FGCN.2007.222","DOIUrl":"https://doi.org/10.1109/FGCN.2007.222","url":null,"abstract":"Mobile IP is a protocol that supports the IP mobility of mobile nodes. However, the protocol has the triangular routing problem. Although many routing optimization extension schemes in IPv6 networks can solve the problem, the delivery of routing optimization messages in the handoff period may incur long transmission delay and message loss, and therefore degrade the performance of routing optimization mechanisms. In addition, all schemes require all mobile nodes and their correspondent nodes to be involved in mobility management. A mobile node must inform its correspondent node of its roaming and its new location address. In this paper, we exploit the domain name system (DNS) to develop a mobility management system. Except granting the access to a new wireless link after roaming, the mobility management is transparent for a mobile node and its correspondent node. No routing optimization message is delivered.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.
{"title":"A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver","authors":"Jisu Jiang, C. Law, Chao Fang","doi":"10.1109/FGCN.2007.26","DOIUrl":"https://doi.org/10.1109/FGCN.2007.26","url":null,"abstract":"Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, electronic message is being used in everyday life. We are facing spam problems. Spam message is widely used for marketing e-Commerce. To block these spam messages, we use filtering or pricing systems. But these solutions raise other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose a grant model for filter of message detour in e- Business system which controls an unsolicited electronic message and prevents useful electronic message from being discarded. We designed and implemented the grant model for filter of message detour in e-Business system to enhance the usefulness and availability of electronic message. Tests of grant model for filter of message detour in e-Business system proved very successful in it's usability and efficiency.
{"title":"Grant Model for Message Detour in Electronic Business System","authors":"Young-Soo Kim, Seok-Soo Kim","doi":"10.1109/FGCN.2007.141","DOIUrl":"https://doi.org/10.1109/FGCN.2007.141","url":null,"abstract":"Today, electronic message is being used in everyday life. We are facing spam problems. Spam message is widely used for marketing e-Commerce. To block these spam messages, we use filtering or pricing systems. But these solutions raise other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose a grant model for filter of message detour in e- Business system which controls an unsolicited electronic message and prevents useful electronic message from being discarded. We designed and implemented the grant model for filter of message detour in e-Business system to enhance the usefulness and availability of electronic message. Tests of grant model for filter of message detour in e-Business system proved very successful in it's usability and efficiency.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}