首页 > 最新文献

2007 International Symposium on Communications and Information Technologies最新文献

英文 中文
Interoperability between set-top box and residential gateway platforms 机顶盒与住宅网关平台之间的互操作性
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392215
Ming-Chien Yang, N. Sheng, B. Huang, J. Tu
This paper introduces a means of enabling the collaboration of Set-Top Box and Residential Gateway platforms. We propose an approach that can let MHP Xlets use OSGi resources and vice versa, i.e., OSGi bundles use MHP services in a simple and efficient way. In our approach, BundleContexts and XletContexts are passed to authorized Xlets and bundles respectively. We have implemented the required software components, and an experiment has been conducted which has verified that our proposal is practical.
本文介绍了一种实现机顶盒与住宅网关平台协同工作的方法。我们提出了一种方法,可以让MHP xlet使用OSGi资源,反之亦然,也就是说,OSGi包以一种简单而有效的方式使用MHP服务。在我们的方法中,BundleContexts和XletContexts分别被传递给授权的xlet和bundle。我们已经实现了所需的软件组件,并进行了实验,验证了我们的建议是可行的。
{"title":"Interoperability between set-top box and residential gateway platforms","authors":"Ming-Chien Yang, N. Sheng, B. Huang, J. Tu","doi":"10.1109/ISCIT.2007.4392215","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392215","url":null,"abstract":"This paper introduces a means of enabling the collaboration of Set-Top Box and Residential Gateway platforms. We propose an approach that can let MHP Xlets use OSGi resources and vice versa, i.e., OSGi bundles use MHP services in a simple and efficient way. In our approach, BundleContexts and XletContexts are passed to authorized Xlets and bundles respectively. We have implemented the required software components, and an experiment has been conducted which has verified that our proposal is practical.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient self-healing process for ZigBee sensor networks ZigBee传感器网络的有效自愈过程
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392233
W. Qiu, Peng Hao, R. Evans
Self-healing is an important feature of robust and reliable wireless sensor networks. ZigBee is an industrial standard widely adopted for wireless sensor networks. We propose an efficient process for a ZigBee network to repair itself after node failure or communication breakdown. It allows a disconnected subnet to rejoin the network with minimum message exchanges and, therefore, saves time and energy. This efficiency is achieved by letting a disconnected node to reconnect to the network together with as many descendant nodes as possible. Theoretical and simulation evaluations confirm the efficiency of the proposed process.
自愈是无线传感器网络鲁棒可靠的重要特征。ZigBee是一种广泛应用于无线传感器网络的工业标准。我们提出了一种有效的ZigBee网络在节点故障或通信中断后进行自我修复的过程。它允许断开的子网以最少的消息交换重新加入网络,因此节省了时间和精力。这种效率是通过让断开连接的节点与尽可能多的后代节点一起重新连接到网络来实现的。理论和仿真验证了该方法的有效性。
{"title":"An efficient self-healing process for ZigBee sensor networks","authors":"W. Qiu, Peng Hao, R. Evans","doi":"10.1109/ISCIT.2007.4392233","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392233","url":null,"abstract":"Self-healing is an important feature of robust and reliable wireless sensor networks. ZigBee is an industrial standard widely adopted for wireless sensor networks. We propose an efficient process for a ZigBee network to repair itself after node failure or communication breakdown. It allows a disconnected subnet to rejoin the network with minimum message exchanges and, therefore, saves time and energy. This efficiency is achieved by letting a disconnected node to reconnect to the network together with as many descendant nodes as possible. Theoretical and simulation evaluations confirm the efficiency of the proposed process.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Securing peer-to-peer overlay networks from Sybil Attack 保护点对点覆盖网络免受西比尔攻击
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392202
E. Lua
Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.
由于缺乏访问控制及其协作资源基础设施,P2P覆盖网络的安全变得复杂。恶意攻击者可以通过冒充其他节点或声称多个任意身份(Sybil攻击)来表现得好像它是危及整个系统完整性和安全性的大量节点。为了解决这一问题,我们提出了一种将基于身份的加密和在线秘密共享方案统一起来的混合安全协议。相对于重量级公钥基础设施PKI (Public Key Infrastructure, PKI)复杂且需要更多内存空间的缺点,我们的方案能够通过从P2P覆盖网络中的节点标识符中轻松获取其他节点的基于id的公共签名验证密钥来验证节点的身份。通过这两种方案的融合,我们的混合安全协议能够验证覆盖节点之间的数据通信,并以安全的方式识别任何恶意(欺骗)节点。我们评估了我们的混合安全协议,并分析了它的有效性。
{"title":"Securing peer-to-peer overlay networks from Sybil Attack","authors":"E. Lua","doi":"10.1109/ISCIT.2007.4392202","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392202","url":null,"abstract":"Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114511273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multimedia performance of a ubiquitous processor 一种泛在处理器的多媒体性能
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392246
M. Fukase, K. Noda, H. Takeda, T. Sato
The key to protect huge amount of multimedia data in ubiquitous networks is to introduce safety aware high-performed single VLSI processor systems embedded with cipher process. Thus, we exploited the architecture of a hardware cryptography-embedded multimedia mobile processor named HCgorilla by sophisticatedly unifying up-to-date processor techniques. Although it was provided with carefully selected Java byte codes and cipher codes, FP (floating point) expression was omitted due to the restriction of hardware resource. Considering recent trend of embedded applications like voice recognition, 3D graphics, and image/vision processing, FP hardware is crucial for further enhancing HCgorilla's Java functions. We focus in this article the development of a compact FPU (Floating point number Processing Unit). A FP format specific for HCgorilla is IEEE 754 compatible except the bitwidth representation of FP data. Prioritizing the latency of FPU, it has only 5 stages, and it works at 400 MHz. FPU is built in HCgorilla by adding 16 FP arithmetic codes carefully selected from Java byte codes, and improving the decode stage of the previous HCgorilla. We have so far accomplished the logic synthesis and behavior simulation.
在无处不在的网络中,保护海量多媒体数据的关键是引入具有安全意识的嵌入式高性能单VLSI处理器系统。因此,我们通过复杂地统一最新的处理器技术,利用了硬件加密嵌入式多媒体移动处理器的体系结构。虽然提供了精心挑选的Java字节码和密码,但由于硬件资源的限制,省略了FP(浮点)表达式。考虑到语音识别、3D图形和图像/视觉处理等嵌入式应用的最新趋势,FP硬件对于进一步增强Java功能至关重要。在本文中,我们重点介绍了一种紧凑的浮点数处理单元(FPU)的开发。除了FP数据的位宽表示外,hcrc专用的FP格式与IEEE 754兼容。优先考虑FPU的延迟,它只有5个阶段,工作在400mhz。在HCgorilla中增加了从Java字节码中精心挑选的16个FP算术码,并改进了以前HCgorilla的解码阶段,从而构建了FPU。目前我们已经完成了逻辑综合和行为模拟。
{"title":"Multimedia performance of a ubiquitous processor","authors":"M. Fukase, K. Noda, H. Takeda, T. Sato","doi":"10.1109/ISCIT.2007.4392246","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392246","url":null,"abstract":"The key to protect huge amount of multimedia data in ubiquitous networks is to introduce safety aware high-performed single VLSI processor systems embedded with cipher process. Thus, we exploited the architecture of a hardware cryptography-embedded multimedia mobile processor named HCgorilla by sophisticatedly unifying up-to-date processor techniques. Although it was provided with carefully selected Java byte codes and cipher codes, FP (floating point) expression was omitted due to the restriction of hardware resource. Considering recent trend of embedded applications like voice recognition, 3D graphics, and image/vision processing, FP hardware is crucial for further enhancing HCgorilla's Java functions. We focus in this article the development of a compact FPU (Floating point number Processing Unit). A FP format specific for HCgorilla is IEEE 754 compatible except the bitwidth representation of FP data. Prioritizing the latency of FPU, it has only 5 stages, and it works at 400 MHz. FPU is built in HCgorilla by adding 16 FP arithmetic codes carefully selected from Java byte codes, and improving the decode stage of the previous HCgorilla. We have so far accomplished the logic synthesis and behavior simulation.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal power analysis for network lifetime balance in wireless sensor networks 无线传感器网络中网络寿命平衡的最优功耗分析
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392192
R. Wen, I. Mareels, B. Krongold
Energy usage is one of the most critically important problems in the exploitation of wireless sensor networks. Using the information redundancy typically present in the data streams in sensor networks due to spatial correlation we may address how to optimize the useful life span of a sensor network under energy constraints for each sensor. A new cost criterion for power optimization amongst sensors is presented. Its implementation and the implications of which are discussed in the context of a star network topology.
能源使用是无线传感器网络开发中最关键的问题之一。利用传感器网络数据流中由于空间相关性而产生的信息冗余,我们可以解决如何在能量约束下优化每个传感器网络的使用寿命。提出了一种新的传感器间功率优化成本准则。在星型网络拓扑的背景下讨论了它的实现及其含义。
{"title":"Optimal power analysis for network lifetime balance in wireless sensor networks","authors":"R. Wen, I. Mareels, B. Krongold","doi":"10.1109/ISCIT.2007.4392192","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392192","url":null,"abstract":"Energy usage is one of the most critically important problems in the exploitation of wireless sensor networks. Using the information redundancy typically present in the data streams in sensor networks due to spatial correlation we may address how to optimize the useful life span of a sensor network under energy constraints for each sensor. A new cost criterion for power optimization amongst sensors is presented. Its implementation and the implications of which are discussed in the context of a star network topology.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight protocol suite for wireless sensor networks: design and evaluation 无线传感器网络的轻量级协议套件:设计和评估
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392191
H. Chen, Changcheng Huang, Li Cui
Lots of protocols have been proposed to make sensor networks more reliable, efficient and applicable. However, a vitally important problem has been neglected, that is the feasibility to implement the protocol and compatibility with other protocols. In this paper, a layered architecture was designed to organize the sensor network protocols in a light way, with detailed description on the interactive interfaces between layers. In accordance with the architecture, a suite of lightweight protocols were designed and implemented as prototypes. Our proposed protocols are featured by their low requirements on the node resources, and high possibility to be deployed in the real world. All these protocols were implemented and evaluated in a unified simulation environment. Simulation results verified our expectation on the performance of the protocols.
为了使传感器网络更加可靠、高效和适用,已经提出了许多协议。然而,一个至关重要的问题却被忽略了,那就是协议实现的可行性和与其他协议的兼容性。本文设计了一种分层的传感器网络协议结构,并对各层之间的交互接口进行了详细的描述。根据该体系结构,设计并实现了一套轻量级协议作为原型。我们提出的协议对节点资源的要求低,在现实世界中部署的可能性高。所有这些协议都在统一的仿真环境中实现和评估。仿真结果验证了我们对协议性能的期望。
{"title":"Lightweight protocol suite for wireless sensor networks: design and evaluation","authors":"H. Chen, Changcheng Huang, Li Cui","doi":"10.1109/ISCIT.2007.4392191","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392191","url":null,"abstract":"Lots of protocols have been proposed to make sensor networks more reliable, efficient and applicable. However, a vitally important problem has been neglected, that is the feasibility to implement the protocol and compatibility with other protocols. In this paper, a layered architecture was designed to organize the sensor network protocols in a light way, with detailed description on the interactive interfaces between layers. In accordance with the architecture, a suite of lightweight protocols were designed and implemented as prototypes. Our proposed protocols are featured by their low requirements on the node resources, and high possibility to be deployed in the real world. All these protocols were implemented and evaluated in a unified simulation environment. Simulation results verified our expectation on the performance of the protocols.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A very low phase noise fully integrated CMOS quadrature LC oscillator for 2.4 GHz bluetooth/WLAN applications 一个非常低的相位噪声完全集成的CMOS正交LC振荡器,用于2.4 GHz蓝牙/WLAN应用
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4391984
O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad
This paper presents a quadrature voltage-controlled oscillator (QVCO) based on the coupling of two LC-tank VCOs. The QVCO could be tuned between 2.41 and 2.64 GHz, and showed a phase noise of -139 dBc/Hz at 1 MHz offset frequency from the carrier across the whole tuning range, for a current consumption of 20 mA with 2.5-V power supply. A figure-of-merit of -190 dBc/Hz is observed.
提出了一种基于两个LC-tank压控振荡器耦合的正交压控振荡器(QVCO)。该QVCO可以在2.41 GHz和2.64 GHz之间调谐,在整个调谐范围内,在载波偏移频率为1 MHz时,相位噪声为-139 dBc/Hz,电流消耗为20 mA,电源为2.5 v。性能因数为-190 dBc/Hz。
{"title":"A very low phase noise fully integrated CMOS quadrature LC oscillator for 2.4 GHz bluetooth/WLAN applications","authors":"O. Frioui, L. Zaid, W. Rahajandraibe, F. Haddad","doi":"10.1109/ISCIT.2007.4391984","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4391984","url":null,"abstract":"This paper presents a quadrature voltage-controlled oscillator (QVCO) based on the coupling of two LC-tank VCOs. The QVCO could be tuned between 2.41 and 2.64 GHz, and showed a phase noise of -139 dBc/Hz at 1 MHz offset frequency from the carrier across the whole tuning range, for a current consumption of 20 mA with 2.5-V power supply. A figure-of-merit of -190 dBc/Hz is observed.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A study on equation error algorithm based on correlation function 基于相关函数的方程误差算法研究
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392023
R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi
Equation error adaptive algorithm (EQ-E) for adaptive infinite impulse response (IIR) digital filter is one of the IIR adaptive algorithms that exhibit global convergence. In the presence of a color disturbance signal, the coefficients of the equation error based adaptive digital filter (ADF) converge to solutions with bias. In this paper, we propose a kind of block adaptive algorithm for the EQ-E IIR ADF. By estimating the correlation functions, the effect of the disturbance signal onto the convergence of the algorithm is reduced.
自适应无限脉冲响应(IIR)数字滤波器的方程误差自适应算法(EQ-E)是一种具有全局收敛性的IIR自适应算法。在存在颜色干扰信号的情况下,基于方程误差的自适应数字滤波器(ADF)的系数收敛到有偏置的解。在本文中,我们提出了一种针对EQ-E IIR ADF的块自适应算法。通过对相关函数的估计,降低了干扰信号对算法收敛性的影响。
{"title":"A study on equation error algorithm based on correlation function","authors":"R. Kanagawa, J. Okello, N. Sasaoka, E. Kuno, Y. Itoh, M. Kobayashi","doi":"10.1109/ISCIT.2007.4392023","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392023","url":null,"abstract":"Equation error adaptive algorithm (EQ-E) for adaptive infinite impulse response (IIR) digital filter is one of the IIR adaptive algorithms that exhibit global convergence. In the presence of a color disturbance signal, the coefficients of the equation error based adaptive digital filter (ADF) converge to solutions with bias. In this paper, we propose a kind of block adaptive algorithm for the EQ-E IIR ADF. By estimating the correlation functions, the effect of the disturbance signal onto the convergence of the algorithm is reduced.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal for a Wireless Mesh Network that realizes seamless handover and its simulation results 一种实现无缝切换的无线Mesh网络的提出及其仿真结果
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392107
M. Ito, T. Shikama, A. Watanabe
Wireless mesh networks have an advantage of building backbone infrastructure easily, where access points, which have been conventionally connected by wired LANs, are connected by an ad-hoc network using wireless LANs. However, the wireless mesh network still has various problems such as the realization of a seamless handover, the securing of a communication bandwidth, and the selection of the most suitable routing protocol. WAPL (wireless access point link) which we propose in this paper can solve all these problems. Namely, WAPL enables a constant seamless handover. It does not give much influence on the traffic. It can also select ad-hoc routing protocols freely. To realize a seamless handover, WAPL is aware of communication routes all the time and sends an advertising message that reports its handover in a unicast mode. To reduce the traffic of control messages, it generates mapping information, which is the relation between access points and terminals on demand. In WAPL, the function generating mapping information is completely independent of an ad-hoc routing protocol. In this paper, we implemented WAPL in network simulator ns-2, and compared it with the existing methods. We succeeded in showing the features of WAPL quantitatively.
无线网状网络具有易于构建骨干基础设施的优点,其中传统上由有线局域网连接的接入点由使用无线局域网的自组织网络连接。然而,无线网状网络仍然存在着实现无缝切换、保证通信带宽、选择最合适的路由协议等诸多问题。本文提出的无线接入点链路(WAPL)可以很好地解决这些问题。也就是说,WAPL支持持续的无缝切换。它对交通没有太大影响。它还可以自由选择ad-hoc路由协议。为了实现无缝切换,WAPL始终感知通信路由,并以单播模式发送广告消息,报告其切换。为了减少控制消息的流量,它生成映射信息,即接入点与终端之间的关系。在WAPL中,生成映射信息的功能完全独立于自组织路由协议。本文在网络模拟器ns-2中实现了WAPL,并与现有方法进行了比较。我们成功地定量地展示了WAPL的特征。
{"title":"Proposal for a Wireless Mesh Network that realizes seamless handover and its simulation results","authors":"M. Ito, T. Shikama, A. Watanabe","doi":"10.1109/ISCIT.2007.4392107","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392107","url":null,"abstract":"Wireless mesh networks have an advantage of building backbone infrastructure easily, where access points, which have been conventionally connected by wired LANs, are connected by an ad-hoc network using wireless LANs. However, the wireless mesh network still has various problems such as the realization of a seamless handover, the securing of a communication bandwidth, and the selection of the most suitable routing protocol. WAPL (wireless access point link) which we propose in this paper can solve all these problems. Namely, WAPL enables a constant seamless handover. It does not give much influence on the traffic. It can also select ad-hoc routing protocols freely. To realize a seamless handover, WAPL is aware of communication routes all the time and sends an advertising message that reports its handover in a unicast mode. To reduce the traffic of control messages, it generates mapping information, which is the relation between access points and terminals on demand. In WAPL, the function generating mapping information is completely independent of an ad-hoc routing protocol. In this paper, we implemented WAPL in network simulator ns-2, and compared it with the existing methods. We succeeded in showing the features of WAPL quantitatively.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e 在IEEE 802.16e上使用MIPv6优化的加密绑定协议
Pub Date : 2007-12-04 DOI: 10.1109/ISCIT.2007.4392204
HyunHwa Park, Sun-Hee Lim, Seunghwan Yun
In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.
在移动通信网络中,互联网流量的增长将引起对IP地址的需求。此外,WiBro还将促进IP地址的互通。事实上,许多工作组正在设计WiBro和IPv6/MIPv6之间的适配机制。因此,从安全的角度来看,802.16e和MIPv6的互通是必不可少的。在本文中,我们提出了一种在WiBro系统的第二层和第三层之间安全高效的OCBP(Optimized Cryptographic Binding Protocol)协议。
{"title":"Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e","authors":"HyunHwa Park, Sun-Hee Lim, Seunghwan Yun","doi":"10.1109/ISCIT.2007.4392204","DOIUrl":"https://doi.org/10.1109/ISCIT.2007.4392204","url":null,"abstract":"In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122032081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2007 International Symposium on Communications and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1