Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174291
Daehan Kwak, Jeonghoon Mo, Moonsoo Kang
Users in vehicles who are interested in accessing Internet services can be achieved by connecting to IEEE 802.11 WLAN APs along the roadside. However, due to the small coverage range of 802.11 APs and high mobility of vehicles, handoffs frequently occur as vehicles migrate across a series of adjacent access points which can be a major source of interruption to seamless connections and throughput reduction. In this paper, we investigate the well-known handoff schemes that have worked to reduce the 802.11 handoff latency and address the possible issues that arise when applied to vehicular scenarios. Our main objective is to provide groundwork for future research on the enhancement of fast handoffs for vehicular scenarios and emphasize that smart and optimized fast handoffs are a critical requirement for seamless connectivity. To meet these requirements, we also suggest that trajectory information (on-board navigation systems) along with neighbor AP information (802.11k) have the potential to provide smart and fast handoffs to support seamless communication in a vehicular scenario.
{"title":"Investigation of handoffs for IEEE 802.11 networks in vehicular environment","authors":"Daehan Kwak, Jeonghoon Mo, Moonsoo Kang","doi":"10.1109/ICUFN.2009.5174291","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174291","url":null,"abstract":"Users in vehicles who are interested in accessing Internet services can be achieved by connecting to IEEE 802.11 WLAN APs along the roadside. However, due to the small coverage range of 802.11 APs and high mobility of vehicles, handoffs frequently occur as vehicles migrate across a series of adjacent access points which can be a major source of interruption to seamless connections and throughput reduction. In this paper, we investigate the well-known handoff schemes that have worked to reduce the 802.11 handoff latency and address the possible issues that arise when applied to vehicular scenarios. Our main objective is to provide groundwork for future research on the enhancement of fast handoffs for vehicular scenarios and emphasize that smart and optimized fast handoffs are a critical requirement for seamless connectivity. To meet these requirements, we also suggest that trajectory information (on-board navigation systems) along with neighbor AP information (802.11k) have the potential to provide smart and fast handoffs to support seamless communication in a vehicular scenario.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174280
Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon
In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching to process data or reduce redundancy in message delivery. We implemented the framework in ns-2 simulator, and conducted a simulation study to evaluate its performance in comparison with existing routing protocols. The simulation results indicate that the framework enhances message delivery ratio, reduces message delivery overhead, and saves energy consumption, regardless of wireless link errors.
{"title":"Provisioning geographic data-centric dissemination in Wireless Sensor Networks","authors":"Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon","doi":"10.1109/ICUFN.2009.5174280","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174280","url":null,"abstract":"In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching to process data or reduce redundancy in message delivery. We implemented the framework in ns-2 simulator, and conducted a simulation study to evaluate its performance in comparison with existing routing protocols. The simulation results indicate that the framework enhances message delivery ratio, reduces message delivery overhead, and saves energy consumption, regardless of wireless link errors.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174286
Simon G. M. Koo
We have presented the need and our position on human-centric mechanism design. In the design, we identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems.
{"title":"Grey-box mechanism design in peer-to-peer cooperative networking","authors":"Simon G. M. Koo","doi":"10.1109/ICUFN.2009.5174286","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174286","url":null,"abstract":"We have presented the need and our position on human-centric mechanism design. In the design, we identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122895465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174290
Ranran Ding, Qing-An Zeng
Traffic safety in any type of transportation systems is a global concerned issue. In this paper, we propose a clustering-based multi-channel Vehicle-to-Vehicle communication system to provide traffic accident avoidance mechanism. In the proposed system, vehicles are self-organized into different clusters, and the traditional single common medium in ad hoc networks has been divided into multiple control channels and a single data channel. An infrastructure-based TDMA/CDMA technique is designed for the intra- and inter-cluster communications via data channel. The IEEE 802.11 CSMA/CA protocol is utilized by control channels. Our system is evaluated by extensive simulations. The simulation results show the proposed system can support traffic safety efficiently.
{"title":"A clustering-based multi-channel Vehicle-to-Vehicle (V2V) communication system","authors":"Ranran Ding, Qing-An Zeng","doi":"10.1109/ICUFN.2009.5174290","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174290","url":null,"abstract":"Traffic safety in any type of transportation systems is a global concerned issue. In this paper, we propose a clustering-based multi-channel Vehicle-to-Vehicle communication system to provide traffic accident avoidance mechanism. In the proposed system, vehicles are self-organized into different clusters, and the traditional single common medium in ad hoc networks has been divided into multiple control channels and a single data channel. An infrastructure-based TDMA/CDMA technique is designed for the intra- and inter-cluster communications via data channel. The IEEE 802.11 CSMA/CA protocol is utilized by control channels. Our system is evaluated by extensive simulations. The simulation results show the proposed system can support traffic safety efficiently.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174282
V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung
In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some of the proposed protocols to be developed and tested on the testbed.
{"title":"A heterogeneous peer-to-peer network testbed","authors":"V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung","doi":"10.1109/ICUFN.2009.5174282","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174282","url":null,"abstract":"In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some of the proposed protocols to be developed and tested on the testbed.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174278
Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo
Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at larger distances. In this paper, we evaluate the reliability of backbone-assisted routing and dissemination in WSNs. In particular, we use reliability theory to investigate two important problems: a) if sensor node to backbone/gateway node ratio is fixed in a unit area, what is the maximum achievable reliability? b) How many wired hops or gateway nodes are required to achieve a given reliability? Finally we analyze the cost and benefit incurred by adding gateway nodes to a backbone-assisted WSN and observe that after a certain threshold adding more backbone nodes to the WSN provides negligible improvement in the overall end-to-end reliability.
{"title":"On the reliability of backbone-assisted end-to-end transmissions in WSNs","authors":"Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo","doi":"10.1109/ICUFN.2009.5174278","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174278","url":null,"abstract":"Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at larger distances. In this paper, we evaluate the reliability of backbone-assisted routing and dissemination in WSNs. In particular, we use reliability theory to investigate two important problems: a) if sensor node to backbone/gateway node ratio is fixed in a unit area, what is the maximum achievable reliability? b) How many wired hops or gateway nodes are required to achieve a given reliability? Finally we analyze the cost and benefit incurred by adding gateway nodes to a backbone-assisted WSN and observe that after a certain threshold adding more backbone nodes to the WSN provides negligible improvement in the overall end-to-end reliability.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174313
Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee
In this paper, we tackle issues on the exposed terminal problem in IEEE 802.11 based wireless networks from a simulative perspective by investigating the internal relationship of node transmission behaviors under various network scenarios. The proposed solution is designed to learn node behaviors according to incoming traffic patterns and to assist wireless nodes make accurate transmission judgment to avoid exposed terminal problems as much as possible. Extensive simulations using ns-2 have been performed to validate the proposed scheme by varying system parameters including carrier sense range and hop counters. Our experimental outcomes show that the proposed solution yields performance gains in terms of aggregate throughput in excess of 10% to 15% compared to the standard.
{"title":"Behavioral learning of exposed terminals in IEEE 802.11 wireless networks","authors":"Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee","doi":"10.1109/ICUFN.2009.5174313","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174313","url":null,"abstract":"In this paper, we tackle issues on the exposed terminal problem in IEEE 802.11 based wireless networks from a simulative perspective by investigating the internal relationship of node transmission behaviors under various network scenarios. The proposed solution is designed to learn node behaviors according to incoming traffic patterns and to assist wireless nodes make accurate transmission judgment to avoid exposed terminal problems as much as possible. Extensive simulations using ns-2 have been performed to validate the proposed scheme by varying system parameters including carrier sense range and hop counters. Our experimental outcomes show that the proposed solution yields performance gains in terms of aggregate throughput in excess of 10% to 15% compared to the standard.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174309
C. Bauer
The International Civil Aviation Organization has adopted IPv6 as the network protocol for the future Aeronautical Telecommunications Network, with Mobile IPv6 (MIPv6) as the baseline protocol to provide IP mobility. For aircraft, the Network Mobility (NEMO) extension to MIPv6 has to be considered, but this protocol does not yet provide any Route Optimization procedure, although many proposals do exist. We present a new mechanism that complements an existing Route Optimization proposal for NEMO, thus making it feasible for the aeronautical environment. This approach is based on certificates that should allow reducing signalling overhead and handover delay while providing a higher level of security.
{"title":"Network mobility route optimization with certificate-based authentication","authors":"C. Bauer","doi":"10.1109/ICUFN.2009.5174309","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174309","url":null,"abstract":"The International Civil Aviation Organization has adopted IPv6 as the network protocol for the future Aeronautical Telecommunications Network, with Mobile IPv6 (MIPv6) as the baseline protocol to provide IP mobility. For aircraft, the Network Mobility (NEMO) extension to MIPv6 has to be considered, but this protocol does not yet provide any Route Optimization procedure, although many proposals do exist. We present a new mechanism that complements an existing Route Optimization proposal for NEMO, thus making it feasible for the aeronautical environment. This approach is based on certificates that should allow reducing signalling overhead and handover delay while providing a higher level of security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174311
C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.
{"title":"Rule-based auditing system for software security assurance","authors":"C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi","doi":"10.1109/ICUFN.2009.5174311","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174311","url":null,"abstract":"We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-07DOI: 10.1109/ICUFN.2009.5174292
Z. Segall
Ubiquitous computing and networking have been fertile grounds for innovation while presenting the challenge of realizing a superior user experience and a viable business model. Unassumingly exploring both the difficult task of innovation and the user experience design, this short contribution will briefly document the emergent trend of combining science and engineering with fields of studies that are considered non-science and non-engineering such as design, fashion and visual arts. The thesis of this work is that ubiquitous computing and networking could substantially benefit from such integrative approach.
{"title":"Convergent design in ubiquitous computing","authors":"Z. Segall","doi":"10.1109/ICUFN.2009.5174292","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174292","url":null,"abstract":"Ubiquitous computing and networking have been fertile grounds for innovation while presenting the challenge of realizing a superior user experience and a viable business model. Unassumingly exploring both the difficult task of innovation and the user experience design, this short contribution will briefly document the emergent trend of combining science and engineering with fields of studies that are considered non-science and non-engineering such as design, fashion and visual arts. The thesis of this work is that ubiquitous computing and networking could substantially benefit from such integrative approach.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}