首页 > 最新文献

2013 16th International Conference on Network-Based Information Systems最新文献

英文 中文
Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks 基于集群的无线传感器网络中带有移动Sink的非实时数据传输机制
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.63
Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang
In traditional wireless sensor networks, the sensed data will be forwarded to sink by multi-hop, so that the hot spot problem will happen on the nodes near the sink. The power consumption of these nodes is higher than others, these nodes will be dead sooner. It leads to the network lifetime decreasing. We proposed a data transmission mechanism using mobile sink to solve this problem. We use two threshold values to prevent data overflow. If the data buffer of cluster head exceed to 1st threshold, the node will call sink to come and transmit data. If the sink didn't arrive the transmission range of the node, and the data buffer exceed to 2nd threshold. Instead of forwarding data to sink directly by multi-hop, we use forwarding data to cluster head of neighboring cluster to help buffer the exceeded data. It can decrease the number of node which has to help to help to forward data, so that it can decrease the power consumption of network, and prolong the network lifetime.
在传统的无线传感器网络中,被感知的数据将通过多跳的方式转发到sink,这样就会在靠近sink的节点上产生热点问题。这些节点的功耗比其他节点高,这些节点会更快死亡。这将导致网络寿命的缩短。为了解决这一问题,我们提出了一种基于移动sink的数据传输机制。我们使用两个阈值来防止数据溢出。如果簇头的数据缓冲区超过第一个阈值,节点将调用sink来传输数据。如果接收器没有到达节点的传输范围,并且数据缓冲区超过第二个阈值。我们采用将数据转发到邻近集群的簇头来缓冲超出的数据,而不是直接通过多跳转发到sink。它可以减少转发数据的节点数量,从而降低网络的功耗,延长网络的生命周期。
{"title":"Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks","authors":"Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang","doi":"10.1109/NBiS.2013.63","DOIUrl":"https://doi.org/10.1109/NBiS.2013.63","url":null,"abstract":"In traditional wireless sensor networks, the sensed data will be forwarded to sink by multi-hop, so that the hot spot problem will happen on the nodes near the sink. The power consumption of these nodes is higher than others, these nodes will be dead sooner. It leads to the network lifetime decreasing. We proposed a data transmission mechanism using mobile sink to solve this problem. We use two threshold values to prevent data overflow. If the data buffer of cluster head exceed to 1st threshold, the node will call sink to come and transmit data. If the sink didn't arrive the transmission range of the node, and the data buffer exceed to 2nd threshold. Instead of forwarding data to sink directly by multi-hop, we use forwarding data to cluster head of neighboring cluster to help buffer the exceeded data. It can decrease the number of node which has to help to help to forward data, so that it can decrease the power consumption of network, and prolong the network lifetime.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federated Identity Access Broker Pattern for Cloud Computing 云计算的联邦身份访问代理模式
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.23
Tim Reimer, P. Abraham, Qing Tan
With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-on environment for services through an identity provider plus sufficient authorization granularity for backend services for the client applications to access. Through detailed discussion of the two standards (SAML 2.0 and OAuth 2.0) this paper presents a study how the two standards can provide a single sign-on solution for cloud computing. Furthermore, by outlining a case study/scenario of the two standards, the Federated Identity Access Broker Pattern for cloud computing is developed to present a solution for these security issues.
随着云计算的采用,大量需要访问云中的服务的前端移动设备正在出现。云中的应用程序现在通常以软件即服务(SaaS)的形式部署。然而,随着SaaS的引入,需要解决新的安全挑战。挑战在于通过身份提供程序为服务提供单点登录环境,并为客户端应用程序访问的后端服务提供足够的授权粒度。通过对两个标准(SAML 2.0和OAuth 2.0)的详细讨论,本文研究了这两个标准如何为云计算提供单点登录解决方案。此外,通过概述这两个标准的案例研究/场景,开发了用于云计算的联邦身份访问代理模式,以提供针对这些安全问题的解决方案。
{"title":"Federated Identity Access Broker Pattern for Cloud Computing","authors":"Tim Reimer, P. Abraham, Qing Tan","doi":"10.1109/NBiS.2013.23","DOIUrl":"https://doi.org/10.1109/NBiS.2013.23","url":null,"abstract":"With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-on environment for services through an identity provider plus sufficient authorization granularity for backend services for the client applications to access. Through detailed discussion of the two standards (SAML 2.0 and OAuth 2.0) this paper presents a study how the two standards can provide a single sign-on solution for cloud computing. Furthermore, by outlining a case study/scenario of the two standards, the Federated Identity Access Broker Pattern for cloud computing is developed to present a solution for these security issues.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop 基于Hadoop的随机自相似性检测异常远程通信
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.43
J. Lee, Sang-Kug Ye, H. Jeong
In recent years, the quantity of teletraffic is rapidly growing because of the explosive increase of Internet users and its applications. The needs of collection, storage, management, analysis, and measurement of the subsequent teletraffic have been emerged as one of very important issues. So far many studies for detecting anomaly teletraffic have been done. However, measurement and analysis studies for big data in cloud computing environments are not actively being made based on Hadoop. Thus, this paper presents for detecting anomaly teletraffic using stochastic self-similarity based on Hadoop. All simulations are conducted under control of our proposed platform, called ATM tool, for anomaly teletraffic intrusion detection system on Hadoop. Our numerical results show that the values of the estimated Hurst parameter obtained from the anomaly teletraffic are much higher when compared to ordinary local area network traffic.
近年来,由于互联网用户及其应用的爆炸式增长,电信通信量迅速增长。对后续通信的采集、存储、管理、分析和测量需求已成为一个非常重要的问题。迄今为止,人们对异常远程通信的检测进行了大量的研究。然而,基于Hadoop的云计算环境下的大数据测量和分析研究并不活跃。为此,本文提出了一种基于Hadoop的随机自相似度检测异常远程通信的方法。所有的仿真都是在我们提出的用于Hadoop异常远程流量入侵检测系统的ATM工具平台的控制下进行的。数值结果表明,从异常话务中得到的赫斯特参数估计值比普通局域网话务高得多。
{"title":"Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop","authors":"J. Lee, Sang-Kug Ye, H. Jeong","doi":"10.1109/NBiS.2013.43","DOIUrl":"https://doi.org/10.1109/NBiS.2013.43","url":null,"abstract":"In recent years, the quantity of teletraffic is rapidly growing because of the explosive increase of Internet users and its applications. The needs of collection, storage, management, analysis, and measurement of the subsequent teletraffic have been emerged as one of very important issues. So far many studies for detecting anomaly teletraffic have been done. However, measurement and analysis studies for big data in cloud computing environments are not actively being made based on Hadoop. Thus, this paper presents for detecting anomaly teletraffic using stochastic self-similarity based on Hadoop. All simulations are conducted under control of our proposed platform, called ATM tool, for anomaly teletraffic intrusion detection system on Hadoop. Our numerical results show that the values of the estimated Hurst parameter obtained from the anomaly teletraffic are much higher when compared to ordinary local area network traffic.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall 柱壁y形分支波导的数值与实验研究
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.84
H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata
Post wall wave guide and photonic crystal wave guide are important structure for microwave transmission of integrated circuits with multi-layered substrates. It has simple periodic array of metallic or dielectric cylinders between parallel conducting plates for two-dimensional structure. In this study, return loss from branching part in Y-shaped wave guide was evaluated both numerically and experimentally for microwave. We successfully proposed an improvement method by shifting a post location at the branching part to reduce the return loss.
后壁波导和光子晶体波导是多层衬底集成电路中微波传输的重要结构。它具有简单的金属或介电圆柱体在平行导电板之间的周期性阵列,用于二维结构。本文从数值和实验两方面对y型波导分支部分的回波损耗进行了研究。我们成功地提出了一种改进方法,通过在分支部分移动一个桩的位置来减少回波损耗。
{"title":"Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall","authors":"H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata","doi":"10.1109/NBiS.2013.84","DOIUrl":"https://doi.org/10.1109/NBiS.2013.84","url":null,"abstract":"Post wall wave guide and photonic crystal wave guide are important structure for microwave transmission of integrated circuits with multi-layered substrates. It has simple periodic array of metallic or dielectric cylinders between parallel conducting plates for two-dimensional structure. In this study, return loss from branching part in Y-shaped wave guide was evaluated both numerically and experimentally for microwave. We successfully proposed an improvement method by shifting a post location at the branching part to reduce the return loss.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Context and the Cloud: Situational Awareness in Mobile Systems 情境与云:移动系统中的态势感知
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.92
P. Moore, Mak Sharma, F. Xhafa, L. Barolli
There has been a paradigm shift in the way users interact with computerized systems and applications. This is driven by the increasing power and ubiquity of 'smart' mobile devices and the traction being generated in Cloud-based systems and the long-term evolution in service provision using Software-as-a-Service. These developments are supported by the rapid and far reaching developments in the related networking infrastructures. This paper considers the nature of Situational Awareness and addresses augmented context, Web 2.0, social media the Internet of Things, and the complexity of context. Mobile networks are considered with large-scale distributed systems and Cloud-based solutions. An illustration of the potential usage of collaborative interactions is presented to demonstrate the benefits which may be derived and the challenges faced. The paper closes with a discussion and conclusions including the identification of future directions for research and open research questions. The paper concludes that augmented context and Situational Awareness forms a central role in the effective provision of services going forward in Cloud-based systems accessed using mobile systems.
用户与计算机系统和应用程序交互的方式已经发生了范式转变。这是由“智能”移动设备的日益强大和无处不在、基于云的系统产生的牵引力以及使用软件即服务的服务提供的长期演变所驱动的。这些发展得到了相关网络基础设施迅速和深远发展的支持。本文考虑了态势感知的本质,并讨论了增强环境、Web 2.0、社交媒体、物联网以及环境的复杂性。移动网络被认为是大规模分布式系统和基于云的解决方案。本文还展示了协作交互的潜在用途,以说明可能产生的好处和面临的挑战。本文以讨论和结论结束,包括确定未来的研究方向和开放的研究问题。本文的结论是,在使用移动系统访问的基于云的系统中,增强的环境和态势感知形成了有效提供服务的核心作用。
{"title":"Context and the Cloud: Situational Awareness in Mobile Systems","authors":"P. Moore, Mak Sharma, F. Xhafa, L. Barolli","doi":"10.1109/NBiS.2013.92","DOIUrl":"https://doi.org/10.1109/NBiS.2013.92","url":null,"abstract":"There has been a paradigm shift in the way users interact with computerized systems and applications. This is driven by the increasing power and ubiquity of 'smart' mobile devices and the traction being generated in Cloud-based systems and the long-term evolution in service provision using Software-as-a-Service. These developments are supported by the rapid and far reaching developments in the related networking infrastructures. This paper considers the nature of Situational Awareness and addresses augmented context, Web 2.0, social media the Internet of Things, and the complexity of context. Mobile networks are considered with large-scale distributed systems and Cloud-based solutions. An illustration of the potential usage of collaborative interactions is presented to demonstrate the benefits which may be derived and the challenges faced. The paper closes with a discussion and conclusions including the identification of future directions for research and open research questions. The paper concludes that augmented context and Situational Awareness forms a central role in the effective provision of services going forward in Cloud-based systems accessed using mobile systems.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure 基于功能信息基础设施的多域功能加密系统的构建
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.19
Y. Niwa, Akira Kanaoka, E. Okamoto
Identity-based encryption (IBE) and cryptographic systems based on IBE, timed-release encryption (TRE), attribute-based encryption (ABE), and functional encryption (FE), use information that identify individuals or groups (e.g., identities, attributes) for encryption and decryption. One significant advantage of FE is the fact that identity and attributes management leads to key management. If an infrastructure for managing identity and attributes existed, we could encrypt a message with identity and attributes (Functional Information, FI) for FE on it. With an infrastructure for FE, we can utilize existing FEs issued for FE and reduce the cost of issuing/managing a new FI only for FE. That is, we could regard FE as a service on the infrastructures in order to delegate management of FI to it. For PKG, a conventional IBE player, we propose a framework that divides it into three entities to enable it to correspond with complex FE systems that federate each function among several FE systems. We also examine use cases in which there are more than one instances of each entity in the same domain, and domain-use cases in which each entity coexists under multi-domain, and apply them to multiple FE systems among different domains. Consequently, we discover challenges that are not described in RFC 5408, also referred to as standardization scalability. On the basis of the use cases, to examine the management of these multi-domains, we develop ABE systems on ID management infrastructure with open protocols for authentication/authorization (OAuth and OpenID Connect) and demonstrate the feasibility of the framework in FE.
基于身份的加密(IBE)和基于IBE、定时释放加密(TRE)、基于属性的加密(ABE)和功能加密(FE)的加密系统使用识别个人或群体(例如身份、属性)的信息进行加密和解密。FE的一个重要优点是身份和属性管理导致密钥管理。如果存在用于管理身份和属性的基础设施,我们就可以用身份和属性(功能性信息,FI)对消息进行加密。有了FE的基础设施,我们可以利用为FE发行的现有FE,并降低仅为FE发行/管理新FI的成本。也就是说,我们可以将FE视为基础设施上的服务,以便将FI的管理委托给它。对于传统的IBE播放器PKG,我们提出了一个框架,将其分为三个实体,使其能够与复杂的FE系统相对应,这些系统将多个FE系统中的每个功能联合起来。我们还检查了在同一域中每个实体有多个实例的用例,以及每个实体共存于多域中的域用例,并将它们应用于不同域中的多个FE系统。因此,我们发现了RFC 5408中没有描述的挑战,也称为标准化可伸缩性。在用例的基础上,为了检查这些多域的管理,我们在ID管理基础设施上开发了ABE系统,并使用开放的身份验证/授权协议(OAuth和OpenID Connect),并演示了该框架在FE中的可行性。
{"title":"Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure","authors":"Y. Niwa, Akira Kanaoka, E. Okamoto","doi":"10.1109/NBiS.2013.19","DOIUrl":"https://doi.org/10.1109/NBiS.2013.19","url":null,"abstract":"Identity-based encryption (IBE) and cryptographic systems based on IBE, timed-release encryption (TRE), attribute-based encryption (ABE), and functional encryption (FE), use information that identify individuals or groups (e.g., identities, attributes) for encryption and decryption. One significant advantage of FE is the fact that identity and attributes management leads to key management. If an infrastructure for managing identity and attributes existed, we could encrypt a message with identity and attributes (Functional Information, FI) for FE on it. With an infrastructure for FE, we can utilize existing FEs issued for FE and reduce the cost of issuing/managing a new FI only for FE. That is, we could regard FE as a service on the infrastructures in order to delegate management of FI to it. For PKG, a conventional IBE player, we propose a framework that divides it into three entities to enable it to correspond with complex FE systems that federate each function among several FE systems. We also examine use cases in which there are more than one instances of each entity in the same domain, and domain-use cases in which each entity coexists under multi-domain, and apply them to multiple FE systems among different domains. Consequently, we discover challenges that are not described in RFC 5408, also referred to as standardization scalability. On the basis of the use cases, to examine the management of these multi-domains, we develop ABE systems on ID management infrastructure with open protocols for authentication/authorization (OAuth and OpenID Connect) and demonstrate the feasibility of the framework in FE.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploratory Coverage in Limited Mobility Sensor Networks 有限移动传感器网络的探索性覆盖
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.30
Mark E. Snyder, S. Chellappan, Mayur Thakur
Autonomous drones are employed with ever increasing frequency in applications ranging from search and rescue, detection of forest fires, and battlefield/ civilian surveillance. In this paper, we study the effects of limited mobility in such mobile sensor platforms, from the perspective of the effect limited mobility has on coverage effectiveness. We define a problem that we call Exploratory Coverage in Limited Mobility Sensor Networks, wherein the objective is to move a number of mobile sensors to fully explore (and hence, sense every point in) a target area in order to detect any critical event that has already occurred in the area. Further, we provide a taxonomy of problems within exploratory coverage as identified by the relationships between sensor range, coverage area, number of sensors, and mobility (range). We then design a purely localized and distributed approximation algorithm for our problem, and provide simulation results to demonstrate the effects of limited mobility on exploratory coverage.
在搜索和救援、森林火灾探测和战场/民用监视等应用中,自主无人机的使用频率越来越高。本文从移动受限对覆盖有效性的影响角度出发,研究了移动传感器平台中受限移动的影响。我们定义了一个问题,我们称之为有限移动传感器网络中的探索性覆盖,其中的目标是移动许多移动传感器来充分探索(因此,感知每个点)目标区域,以检测该区域已经发生的任何关键事件。此外,我们还提供了探索性覆盖范围内的问题分类,这些问题由传感器范围、覆盖区域、传感器数量和移动(范围)之间的关系确定。然后,我们为我们的问题设计了一个纯粹的局部和分布式近似算法,并提供了模拟结果来证明有限移动对探索覆盖的影响。
{"title":"Exploratory Coverage in Limited Mobility Sensor Networks","authors":"Mark E. Snyder, S. Chellappan, Mayur Thakur","doi":"10.1109/NBiS.2013.30","DOIUrl":"https://doi.org/10.1109/NBiS.2013.30","url":null,"abstract":"Autonomous drones are employed with ever increasing frequency in applications ranging from search and rescue, detection of forest fires, and battlefield/ civilian surveillance. In this paper, we study the effects of limited mobility in such mobile sensor platforms, from the perspective of the effect limited mobility has on coverage effectiveness. We define a problem that we call Exploratory Coverage in Limited Mobility Sensor Networks, wherein the objective is to move a number of mobile sensors to fully explore (and hence, sense every point in) a target area in order to detect any critical event that has already occurred in the area. Further, we provide a taxonomy of problems within exploratory coverage as identified by the relationships between sensor range, coverage area, number of sensors, and mobility (range). We then design a purely localized and distributed approximation algorithm for our problem, and provide simulation results to demonstrate the effects of limited mobility on exploratory coverage.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location Privacy Vulnerable from Bluetooth Devices 蓝牙设备的位置隐私易受攻击
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.89
Hiroaki Kikuchi, Takeru Yokomizo
Bluetooth is a wireless network protocol widely used for many mobile devices. With carrying some Bluetooth devices, individuals are in the risk to be identified without noticing. Many devices are shipped as Bluetooth activated as default. This paper reports the experimental results on scanning Mac address of bluetooth devices and shows the risk of location privacy to be compromised from the bluetooth scanning.
蓝牙是一种广泛应用于许多移动设备的无线网络协议。携带蓝牙设备的人有可能在没有注意到的情况下被认出来。许多设备出厂时默认激活蓝牙。本文报告了扫描蓝牙设备Mac地址的实验结果,并展示了蓝牙扫描带来的位置隐私泄露风险。
{"title":"Location Privacy Vulnerable from Bluetooth Devices","authors":"Hiroaki Kikuchi, Takeru Yokomizo","doi":"10.1109/NBiS.2013.89","DOIUrl":"https://doi.org/10.1109/NBiS.2013.89","url":null,"abstract":"Bluetooth is a wireless network protocol widely used for many mobile devices. With carrying some Bluetooth devices, individuals are in the risk to be identified without noticing. Many devices are shipped as Bluetooth activated as default. This paper reports the experimental results on scanning Mac address of bluetooth devices and shows the risk of location privacy to be compromised from the bluetooth scanning.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"34 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs 无线传感器网络中移动传感器和静态接收器的性能比较
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.104
L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino
In this paper, we study the effect of mobile sink and mobile sensors in WSN performance. The WSNs should allow a systematic deployment of sensor nodes including mobility among them. The disseminated data from the sensor nodes are gathered at the sink node. Data dissemination is the major source for energy consumption in WSNs. We consider goodput, depletion and Routing Efficiency (RE) parameters to evaluate the performance of WSNs considering different speeds of mobile sink and sensor nodes. The simulation results show that when the network is congested (Tr is higher), the goodput decreases. For Static Sink (SS) scenario, the difference between evaluation parameters is not too much. For Moving Sink (MS) scenario, the goodput is higher for 10 m/s and RE is higher when moving speed is 5 m/s.
本文研究了移动接收器和移动传感器对无线传感器网络性能的影响。wsn应该允许系统地部署传感器节点,包括它们之间的移动性。来自传感器节点的散布数据被收集到汇聚节点。数据传播是无线传感器网络能耗的主要来源。考虑移动sink和传感器节点的不同速度,我们考虑了goodput, depletion和Routing Efficiency (RE)参数来评估WSNs的性能。仿真结果表明,当网络拥塞(Tr较高)时,goodput减小。对于静态汇(SS)场景,评估参数之间的差异不会太大。对于移动Sink (Moving Sink)场景,10m /s时goodput较高,5m /s时RE较高。
{"title":"Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs","authors":"L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino","doi":"10.1109/NBiS.2013.104","DOIUrl":"https://doi.org/10.1109/NBiS.2013.104","url":null,"abstract":"In this paper, we study the effect of mobile sink and mobile sensors in WSN performance. The WSNs should allow a systematic deployment of sensor nodes including mobility among them. The disseminated data from the sensor nodes are gathered at the sink node. Data dissemination is the major source for energy consumption in WSNs. We consider goodput, depletion and Routing Efficiency (RE) parameters to evaluate the performance of WSNs considering different speeds of mobile sink and sensor nodes. The simulation results show that when the network is congested (Tr is higher), the goodput decreases. For Static Sink (SS) scenario, the difference between evaluation parameters is not too much. For Moving Sink (MS) scenario, the goodput is higher for 10 m/s and RE is higher when moving speed is 5 m/s.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Faster Scalar Multiplication for Elliptic Curve Cryptosystems 椭圆曲线密码系统的快速标量乘法
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.87
Y. Sakemi, T. Izu, Masaaki Shirase
In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase showed that the strategy is efficient for ECADD in the projective coordinates. This paper applies Shirase's strategy to ECDBL in the projective coordinates, and to ECADD and ECDBL in the Jacobian coordinates, and evaluates the efficiency of Shirase's strategy for computing a scalar multiplication.
在椭圆曲线密码系统(ECC)中,基点的标量乘法是最耗时的运算。因此,对标量乘法算法提出了许多改进。在TwC 2013中,Shirase引入了一种新的策略,通过将基点转换为x坐标值为0的新基点来高效地计算标量乘法[Shi13]。事实上,Shirase证明了该策略在射影坐标下对ECADD是有效的。本文将Shirase策略应用于射影坐标系下的ECDBL,并将其应用于雅可比坐标系下的ECADD和ECDBL,并对Shirase策略计算标量乘法的效率进行了评价。
{"title":"Faster Scalar Multiplication for Elliptic Curve Cryptosystems","authors":"Y. Sakemi, T. Izu, Masaaki Shirase","doi":"10.1109/NBiS.2013.87","DOIUrl":"https://doi.org/10.1109/NBiS.2013.87","url":null,"abstract":"In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase showed that the strategy is efficient for ECADD in the projective coordinates. This paper applies Shirase's strategy to ECDBL in the projective coordinates, and to ECADD and ECDBL in the Jacobian coordinates, and evaluates the efficiency of Shirase's strategy for computing a scalar multiplication.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 16th International Conference on Network-Based Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1