Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392215
Ming-Chien Yang, N. Sheng, B. Huang, J. Tu
This paper introduces a means of enabling the collaboration of Set-Top Box and Residential Gateway platforms. We propose an approach that can let MHP Xlets use OSGi resources and vice versa, i.e., OSGi bundles use MHP services in a simple and efficient way. In our approach, BundleContexts and XletContexts are passed to authorized Xlets and bundles respectively. We have implemented the required software components, and an experiment has been conducted which has verified that our proposal is practical.
{"title":"Interoperability between set-top box and residential gateway platforms","authors":"Ming-Chien Yang, N. Sheng, B. Huang, J. Tu","doi":"10.1109/ISCIT.2007.4392215","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392215","url":null,"abstract":"This paper introduces a means of enabling the collaboration of Set-Top Box and Residential Gateway platforms. We propose an approach that can let MHP Xlets use OSGi resources and vice versa, i.e., OSGi bundles use MHP services in a simple and efficient way. In our approach, BundleContexts and XletContexts are passed to authorized Xlets and bundles respectively. We have implemented the required software components, and an experiment has been conducted which has verified that our proposal is practical.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392233
W. Qiu, Peng Hao, R. Evans
Self-healing is an important feature of robust and reliable wireless sensor networks. ZigBee is an industrial standard widely adopted for wireless sensor networks. We propose an efficient process for a ZigBee network to repair itself after node failure or communication breakdown. It allows a disconnected subnet to rejoin the network with minimum message exchanges and, therefore, saves time and energy. This efficiency is achieved by letting a disconnected node to reconnect to the network together with as many descendant nodes as possible. Theoretical and simulation evaluations confirm the efficiency of the proposed process.
{"title":"An efficient self-healing process for ZigBee sensor networks","authors":"W. Qiu, Peng Hao, R. Evans","doi":"10.1109/ISCIT.2007.4392233","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392233","url":null,"abstract":"Self-healing is an important feature of robust and reliable wireless sensor networks. ZigBee is an industrial standard widely adopted for wireless sensor networks. We propose an efficient process for a ZigBee network to repair itself after node failure or communication breakdown. It allows a disconnected subnet to rejoin the network with minimum message exchanges and, therefore, saves time and energy. This efficiency is achieved by letting a disconnected node to reconnect to the network together with as many descendant nodes as possible. Theoretical and simulation evaluations confirm the efficiency of the proposed process.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392202
E. Lua
Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.
{"title":"Securing peer-to-peer overlay networks from Sybil Attack","authors":"E. Lua","doi":"10.1109/ISCIT.2007.4392202","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392202","url":null,"abstract":"Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392246
M. Fukase, K. Noda, H. Takeda, T. Sato
The key to protect huge amount of multimedia data in ubiquitous networks is to introduce safety aware high-performed single VLSI processor systems embedded with cipher process. Thus, we exploited the architecture of a hardware cryptography-embedded multimedia mobile processor named HCgorilla by sophisticatedly unifying up-to-date processor techniques. Although it was provided with carefully selected Java byte codes and cipher codes, FP (floating point) expression was omitted due to the restriction of hardware resource. Considering recent trend of embedded applications like voice recognition, 3D graphics, and image/vision processing, FP hardware is crucial for further enhancing HCgorilla's Java functions. We focus in this article the development of a compact FPU (Floating point number Processing Unit). A FP format specific for HCgorilla is IEEE 754 compatible except the bitwidth representation of FP data. Prioritizing the latency of FPU, it has only 5 stages, and it works at 400 MHz. FPU is built in HCgorilla by adding 16 FP arithmetic codes carefully selected from Java byte codes, and improving the decode stage of the previous HCgorilla. We have so far accomplished the logic synthesis and behavior simulation.
{"title":"Multimedia performance of a ubiquitous processor","authors":"M. Fukase, K. Noda, H. Takeda, T. Sato","doi":"10.1109/ISCIT.2007.4392246","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392246","url":null,"abstract":"The key to protect huge amount of multimedia data in ubiquitous networks is to introduce safety aware high-performed single VLSI processor systems embedded with cipher process. Thus, we exploited the architecture of a hardware cryptography-embedded multimedia mobile processor named HCgorilla by sophisticatedly unifying up-to-date processor techniques. Although it was provided with carefully selected Java byte codes and cipher codes, FP (floating point) expression was omitted due to the restriction of hardware resource. Considering recent trend of embedded applications like voice recognition, 3D graphics, and image/vision processing, FP hardware is crucial for further enhancing HCgorilla's Java functions. We focus in this article the development of a compact FPU (Floating point number Processing Unit). A FP format specific for HCgorilla is IEEE 754 compatible except the bitwidth representation of FP data. Prioritizing the latency of FPU, it has only 5 stages, and it works at 400 MHz. FPU is built in HCgorilla by adding 16 FP arithmetic codes carefully selected from Java byte codes, and improving the decode stage of the previous HCgorilla. We have so far accomplished the logic synthesis and behavior simulation.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392192
R. Wen, I. Mareels, B. Krongold
Energy usage is one of the most critically important problems in the exploitation of wireless sensor networks. Using the information redundancy typically present in the data streams in sensor networks due to spatial correlation we may address how to optimize the useful life span of a sensor network under energy constraints for each sensor. A new cost criterion for power optimization amongst sensors is presented. Its implementation and the implications of which are discussed in the context of a star network topology.
{"title":"Optimal power analysis for network lifetime balance in wireless sensor networks","authors":"R. Wen, I. Mareels, B. Krongold","doi":"10.1109/ISCIT.2007.4392192","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392192","url":null,"abstract":"Energy usage is one of the most critically important problems in the exploitation of wireless sensor networks. Using the information redundancy typically present in the data streams in sensor networks due to spatial correlation we may address how to optimize the useful life span of a sensor network under energy constraints for each sensor. A new cost criterion for power optimization amongst sensors is presented. Its implementation and the implications of which are discussed in the context of a star network topology.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392191
H. Chen, Changcheng Huang, Li Cui
Lots of protocols have been proposed to make sensor networks more reliable, efficient and applicable. However, a vitally important problem has been neglected, that is the feasibility to implement the protocol and compatibility with other protocols. In this paper, a layered architecture was designed to organize the sensor network protocols in a light way, with detailed description on the interactive interfaces between layers. In accordance with the architecture, a suite of lightweight protocols were designed and implemented as prototypes. Our proposed protocols are featured by their low requirements on the node resources, and high possibility to be deployed in the real world. All these protocols were implemented and evaluated in a unified simulation environment. Simulation results verified our expectation on the performance of the protocols.
{"title":"Lightweight protocol suite for wireless sensor networks: design and evaluation","authors":"H. Chen, Changcheng Huang, Li Cui","doi":"10.1109/ISCIT.2007.4392191","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392191","url":null,"abstract":"Lots of protocols have been proposed to make sensor networks more reliable, efficient and applicable. However, a vitally important problem has been neglected, that is the feasibility to implement the protocol and compatibility with other protocols. In this paper, a layered architecture was designed to organize the sensor network protocols in a light way, with detailed description on the interactive interfaces between layers. In accordance with the architecture, a suite of lightweight protocols were designed and implemented as prototypes. Our proposed protocols are featured by their low requirements on the node resources, and high possibility to be deployed in the real world. All these protocols were implemented and evaluated in a unified simulation environment. Simulation results verified our expectation on the performance of the protocols.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4391984
O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad
This paper presents a quadrature voltage-controlled oscillator (QVCO) based on the coupling of two LC-tank VCOs. The QVCO could be tuned between 2.41 and 2.64 GHz, and showed a phase noise of -139 dBc/Hz at 1 MHz offset frequency from the carrier across the whole tuning range, for a current consumption of 20 mA with 2.5-V power supply. A figure-of-merit of -190 dBc/Hz is observed.
{"title":"A very low phase noise fully integrated CMOS quadrature LC oscillator for 2.4 GHz bluetooth/WLAN applications","authors":"O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad","doi":"10.1109/ISCIT.2007.4391984","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4391984","url":null,"abstract":"This paper presents a quadrature voltage-controlled oscillator (QVCO) based on the coupling of two LC-tank VCOs. The QVCO could be tuned between 2.41 and 2.64 GHz, and showed a phase noise of -139 dBc/Hz at 1 MHz offset frequency from the carrier across the whole tuning range, for a current consumption of 20 mA with 2.5-V power supply. A figure-of-merit of -190 dBc/Hz is observed.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392023
R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi
Equation error adaptive algorithm (EQ-E) for adaptive infinite impulse response (IIR) digital filter is one of the IIR adaptive algorithms that exhibit global convergence. In the presence of a color disturbance signal, the coefficients of the equation error based adaptive digital filter (ADF) converge to solutions with bias. In this paper, we propose a kind of block adaptive algorithm for the EQ-E IIR ADF. By estimating the correlation functions, the effect of the disturbance signal onto the convergence of the algorithm is reduced.
{"title":"A study on equation error algorithm based on correlation function","authors":"R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi","doi":"10.1109/ISCIT.2007.4392023","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392023","url":null,"abstract":"Equation error adaptive algorithm (EQ-E) for adaptive infinite impulse response (IIR) digital filter is one of the IIR adaptive algorithms that exhibit global convergence. In the presence of a color disturbance signal, the coefficients of the equation error based adaptive digital filter (ADF) converge to solutions with bias. In this paper, we propose a kind of block adaptive algorithm for the EQ-E IIR ADF. By estimating the correlation functions, the effect of the disturbance signal onto the convergence of the algorithm is reduced.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392107
M. Ito, T. Shikama, A. Watanabe
Wireless mesh networks have an advantage of building backbone infrastructure easily, where access points, which have been conventionally connected by wired LANs, are connected by an ad-hoc network using wireless LANs. However, the wireless mesh network still has various problems such as the realization of a seamless handover, the securing of a communication bandwidth, and the selection of the most suitable routing protocol. WAPL (wireless access point link) which we propose in this paper can solve all these problems. Namely, WAPL enables a constant seamless handover. It does not give much influence on the traffic. It can also select ad-hoc routing protocols freely. To realize a seamless handover, WAPL is aware of communication routes all the time and sends an advertising message that reports its handover in a unicast mode. To reduce the traffic of control messages, it generates mapping information, which is the relation between access points and terminals on demand. In WAPL, the function generating mapping information is completely independent of an ad-hoc routing protocol. In this paper, we implemented WAPL in network simulator ns-2, and compared it with the existing methods. We succeeded in showing the features of WAPL quantitatively.
{"title":"Proposal for a Wireless Mesh Network that realizes seamless handover and its simulation results","authors":"M. Ito, T. Shikama, A. Watanabe","doi":"10.1109/ISCIT.2007.4392107","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392107","url":null,"abstract":"Wireless mesh networks have an advantage of building backbone infrastructure easily, where access points, which have been conventionally connected by wired LANs, are connected by an ad-hoc network using wireless LANs. However, the wireless mesh network still has various problems such as the realization of a seamless handover, the securing of a communication bandwidth, and the selection of the most suitable routing protocol. WAPL (wireless access point link) which we propose in this paper can solve all these problems. Namely, WAPL enables a constant seamless handover. It does not give much influence on the traffic. It can also select ad-hoc routing protocols freely. To realize a seamless handover, WAPL is aware of communication routes all the time and sends an advertising message that reports its handover in a unicast mode. To reduce the traffic of control messages, it generates mapping information, which is the relation between access points and terminals on demand. In WAPL, the function generating mapping information is completely independent of an ad-hoc routing protocol. In this paper, we implemented WAPL in network simulator ns-2, and compared it with the existing methods. We succeeded in showing the features of WAPL quantitatively.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-04DOI: 10.1109/ISCIT.2007.4392204
HyunHwa Park, Sun-Hee Lim, Seunghwan Yun
In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.
{"title":"Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e","authors":"HyunHwa Park, Sun-Hee Lim, Seunghwan Yun","doi":"10.1109/ISCIT.2007.4392204","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392204","url":null,"abstract":"In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122032081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}