首页 > 最新文献

2009 First International Conference on Ubiquitous and Future Networks最新文献

英文 中文
Investigation of handoffs for IEEE 802.11 networks in vehicular environment 车载环境下IEEE 802.11网络切换研究
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174291
Daehan Kwak, Jeonghoon Mo, Moonsoo Kang
Users in vehicles who are interested in accessing Internet services can be achieved by connecting to IEEE 802.11 WLAN APs along the roadside. However, due to the small coverage range of 802.11 APs and high mobility of vehicles, handoffs frequently occur as vehicles migrate across a series of adjacent access points which can be a major source of interruption to seamless connections and throughput reduction. In this paper, we investigate the well-known handoff schemes that have worked to reduce the 802.11 handoff latency and address the possible issues that arise when applied to vehicular scenarios. Our main objective is to provide groundwork for future research on the enhancement of fast handoffs for vehicular scenarios and emphasize that smart and optimized fast handoffs are a critical requirement for seamless connectivity. To meet these requirements, we also suggest that trajectory information (on-board navigation systems) along with neighbor AP information (802.11k) have the potential to provide smart and fast handoffs to support seamless communication in a vehicular scenario.
有兴趣访问互联网服务的车辆用户可以通过连接到路边的IEEE 802.11 WLAN ap来实现。然而,由于802.11 ap的覆盖范围小,车辆的移动性高,当车辆在一系列相邻接入点之间迁移时,切换经常发生,这可能是无缝连接中断和吞吐量降低的主要原因。在本文中,我们研究了众所周知的切换方案,这些方案已经减少了802.11切换延迟,并解决了应用于车辆场景时可能出现的问题。我们的主要目标是为未来研究增强车辆场景的快速切换提供基础,并强调智能和优化的快速切换是无缝连接的关键要求。为了满足这些要求,我们还建议轨迹信息(车载导航系统)以及相邻AP信息(802.11k)具有提供智能快速切换的潜力,以支持车辆场景中的无缝通信。
{"title":"Investigation of handoffs for IEEE 802.11 networks in vehicular environment","authors":"Daehan Kwak, Jeonghoon Mo, Moonsoo Kang","doi":"10.1109/ICUFN.2009.5174291","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174291","url":null,"abstract":"Users in vehicles who are interested in accessing Internet services can be achieved by connecting to IEEE 802.11 WLAN APs along the roadside. However, due to the small coverage range of 802.11 APs and high mobility of vehicles, handoffs frequently occur as vehicles migrate across a series of adjacent access points which can be a major source of interruption to seamless connections and throughput reduction. In this paper, we investigate the well-known handoff schemes that have worked to reduce the 802.11 handoff latency and address the possible issues that arise when applied to vehicular scenarios. Our main objective is to provide groundwork for future research on the enhancement of fast handoffs for vehicular scenarios and emphasize that smart and optimized fast handoffs are a critical requirement for seamless connectivity. To meet these requirements, we also suggest that trajectory information (on-board navigation systems) along with neighbor AP information (802.11k) have the potential to provide smart and fast handoffs to support seamless communication in a vehicular scenario.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Provisioning geographic data-centric dissemination in Wireless Sensor Networks 无线传感器网络中以地理数据为中心的分发
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174280
Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon
In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching to process data or reduce redundancy in message delivery. We implemented the framework in ns-2 simulator, and conducted a simulation study to evaluate its performance in comparison with existing routing protocols. The simulation results indicate that the framework enhances message delivery ratio, reduces message delivery overhead, and saves energy consumption, regardless of wireless link errors.
在本文中,我们建议在无线传感器网络中使用地理信息和网络级缓存来增强以数据为中心的传播框架。提出的框架通过三个主要组件增强了以数据为中心的路由:(1)发布/订阅范式来协调源和汇;(2)地理扩散,减少不必要的数据转发;(3)网络级缓存处理数据或减少消息传递中的冗余。我们在ns-2模拟器中实现了该框架,并进行了仿真研究,以评估其与现有路由协议的性能。仿真结果表明,在不考虑无线链路错误的情况下,该框架提高了消息传递率,降低了消息传递开销,节约了能耗。
{"title":"Provisioning geographic data-centric dissemination in Wireless Sensor Networks","authors":"Hyunjun Choi, Hwangnam Kim, Sunshin An, Minsu Kim, Y. Jeon","doi":"10.1109/ICUFN.2009.5174280","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174280","url":null,"abstract":"In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching to process data or reduce redundancy in message delivery. We implemented the framework in ns-2 simulator, and conducted a simulation study to evaluate its performance in comparison with existing routing protocols. The simulation results indicate that the framework enhances message delivery ratio, reduces message delivery overhead, and saves energy consumption, regardless of wireless link errors.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grey-box mechanism design in peer-to-peer cooperative networking 点对点协作网络中的灰盒机制设计
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174286
Simon G. M. Koo
We have presented the need and our position on human-centric mechanism design. In the design, we identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems.
提出了以人为本的机制设计的必要性和立场。在设计中,我们确定了人为干预影响社会福利的情况,并将点对点灰盒系统的设计框架纳入其中。
{"title":"Grey-box mechanism design in peer-to-peer cooperative networking","authors":"Simon G. M. Koo","doi":"10.1109/ICUFN.2009.5174286","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174286","url":null,"abstract":"We have presented the need and our position on human-centric mechanism design. In the design, we identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122895465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A clustering-based multi-channel Vehicle-to-Vehicle (V2V) communication system 基于集群的多通道车对车通信系统
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174290
Ranran Ding, Qing-An Zeng
Traffic safety in any type of transportation systems is a global concerned issue. In this paper, we propose a clustering-based multi-channel Vehicle-to-Vehicle communication system to provide traffic accident avoidance mechanism. In the proposed system, vehicles are self-organized into different clusters, and the traditional single common medium in ad hoc networks has been divided into multiple control channels and a single data channel. An infrastructure-based TDMA/CDMA technique is designed for the intra- and inter-cluster communications via data channel. The IEEE 802.11 CSMA/CA protocol is utilized by control channels. Our system is evaluated by extensive simulations. The simulation results show the proposed system can support traffic safety efficiently.
任何运输系统的交通安全都是一个全球性的问题。本文提出了一种基于集群的多通道车对车通信系统,以提供交通事故避免机制。在该系统中,车辆被自组织成不同的集群,传统的ad hoc网络中单一的公共媒体被划分为多个控制通道和单个数据通道。设计了一种基于基础结构的TDMA/CDMA技术,用于集群内和集群间的数据信道通信。控制通道采用IEEE 802.11 CSMA/CA协议。我们的系统是通过大量的模拟来评估的。仿真结果表明,该系统能够有效地支持交通安全。
{"title":"A clustering-based multi-channel Vehicle-to-Vehicle (V2V) communication system","authors":"Ranran Ding, Qing-An Zeng","doi":"10.1109/ICUFN.2009.5174290","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174290","url":null,"abstract":"Traffic safety in any type of transportation systems is a global concerned issue. In this paper, we propose a clustering-based multi-channel Vehicle-to-Vehicle communication system to provide traffic accident avoidance mechanism. In the proposed system, vehicles are self-organized into different clusters, and the traditional single common medium in ad hoc networks has been divided into multiple control channels and a single data channel. An infrastructure-based TDMA/CDMA technique is designed for the intra- and inter-cluster communications via data channel. The IEEE 802.11 CSMA/CA protocol is utilized by control channels. Our system is evaluated by extensive simulations. The simulation results show the proposed system can support traffic safety efficiently.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A heterogeneous peer-to-peer network testbed 异构点对点网络测试平台
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174282
V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung
In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some of the proposed protocols to be developed and tested on the testbed.
在本文中,我们描述了一个异构点对点网络测试平台,它是一个联合研究项目的一部分,用于研究异构有线/无线环境中新的资源发现和内容分发协议。介绍了试验台需求、试验台体系结构、多功能无线节点和软件体系结构。我们还描述了一些需要在测试平台上开发和测试的提议协议。
{"title":"A heterogeneous peer-to-peer network testbed","authors":"V. Li, Li Cui, Qiang Liu, Guang-Hua Yang, Ze Zhao, Ka-Cheong Leung","doi":"10.1109/ICUFN.2009.5174282","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174282","url":null,"abstract":"In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some of the proposed protocols to be developed and tested on the testbed.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the reliability of backbone-assisted end-to-end transmissions in WSNs 无线传感器网络中骨干网辅助端到端传输的可靠性研究
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174278
Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo
Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at larger distances. In this paper, we evaluate the reliability of backbone-assisted routing and dissemination in WSNs. In particular, we use reliability theory to investigate two important problems: a) if sensor node to backbone/gateway node ratio is fixed in a unit area, what is the maximum achievable reliability? b) How many wired hops or gateway nodes are required to achieve a given reliability? Finally we analyze the cost and benefit incurred by adding gateway nodes to a backbone-assisted WSN and observe that after a certain threshold adding more backbone nodes to the WSN provides negligible improvement in the overall end-to-end reliability.
无线传感器网络(wsn)的许多预期部署场景,特别是军事、医疗保健和灾难恢复应用,都需要可靠的通信源。由于传感器的传输范围非常有限,为了实现更高的端到端传输可靠性,wsn通常采用中间骨干链路(有线或无线),可以在更远的距离上传输数据包。在本文中,我们评估了无线传感器网络中主干网辅助路由和传播的可靠性。特别地,我们使用可靠性理论研究了两个重要问题:a)如果在单位面积内传感器节点与骨干/网关节点的比例是固定的,那么可实现的最大可靠性是多少?b)需要多少有线跳数或网关节点才能达到给定的可靠性?最后,我们分析了在骨干辅助WSN中增加网关节点所带来的成本和收益,并观察到在一定阈值之后,在WSN中增加更多骨干节点对整体端到端可靠性的改善可以忽略不计。
{"title":"On the reliability of backbone-assisted end-to-end transmissions in WSNs","authors":"Ali Tufail, S. A. Khayam, Amna Ali, W. A. Baig, F. Anwar, Ki-Hyung Kim, S. Yoo","doi":"10.1109/ICUFN.2009.5174278","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174278","url":null,"abstract":"Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at larger distances. In this paper, we evaluate the reliability of backbone-assisted routing and dissemination in WSNs. In particular, we use reliability theory to investigate two important problems: a) if sensor node to backbone/gateway node ratio is fixed in a unit area, what is the maximum achievable reliability? b) How many wired hops or gateway nodes are required to achieve a given reliability? Finally we analyze the cost and benefit incurred by adding gateway nodes to a backbone-assisted WSN and observe that after a certain threshold adding more backbone nodes to the WSN provides negligible improvement in the overall end-to-end reliability.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Behavioral learning of exposed terminals in IEEE 802.11 wireless networks IEEE 802.11无线网络中暴露终端的行为学习
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174313
Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee
In this paper, we tackle issues on the exposed terminal problem in IEEE 802.11 based wireless networks from a simulative perspective by investigating the internal relationship of node transmission behaviors under various network scenarios. The proposed solution is designed to learn node behaviors according to incoming traffic patterns and to assist wireless nodes make accurate transmission judgment to avoid exposed terminal problems as much as possible. Extensive simulations using ns-2 have been performed to validate the proposed scheme by varying system parameters including carrier sense range and hop counters. Our experimental outcomes show that the proposed solution yields performance gains in terms of aggregate throughput in excess of 10% to 15% compared to the standard.
本文通过研究不同网络场景下节点传输行为的内在关系,从仿真的角度解决了基于IEEE 802.11的无线网络中的暴露终端问题。该方案旨在根据传入流量模式学习节点行为,帮助无线节点进行准确的传输判断,尽可能避免暴露的终端问题。利用ns-2进行了广泛的仿真,通过改变系统参数(包括载波检测范围和跳数计数器)来验证所提出的方案。我们的实验结果表明,与标准相比,所提出的解决方案在总吞吐量方面产生了超过10%到15%的性能提升。
{"title":"Behavioral learning of exposed terminals in IEEE 802.11 wireless networks","authors":"Jun Cao, Jieun Yu, Kyunghwi Kim, Wonjun Lee","doi":"10.1109/ICUFN.2009.5174313","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174313","url":null,"abstract":"In this paper, we tackle issues on the exposed terminal problem in IEEE 802.11 based wireless networks from a simulative perspective by investigating the internal relationship of node transmission behaviors under various network scenarios. The proposed solution is designed to learn node behaviors according to incoming traffic patterns and to assist wireless nodes make accurate transmission judgment to avoid exposed terminal problems as much as possible. Extensive simulations using ns-2 have been performed to validate the proposed scheme by varying system parameters including carrier sense range and hop counters. Our experimental outcomes show that the proposed solution yields performance gains in terms of aggregate throughput in excess of 10% to 15% compared to the standard.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network mobility route optimization with certificate-based authentication 基于证书认证的网络移动路由优化
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174309
C. Bauer
The International Civil Aviation Organization has adopted IPv6 as the network protocol for the future Aeronautical Telecommunications Network, with Mobile IPv6 (MIPv6) as the baseline protocol to provide IP mobility. For aircraft, the Network Mobility (NEMO) extension to MIPv6 has to be considered, but this protocol does not yet provide any Route Optimization procedure, although many proposals do exist. We present a new mechanism that complements an existing Route Optimization proposal for NEMO, thus making it feasible for the aeronautical environment. This approach is based on certificates that should allow reducing signalling overhead and handover delay while providing a higher level of security.
国际民用航空组织已采用IPv6作为未来航空电信网的网络协议,并将移动IPv6 (MIPv6)作为提供IP移动性的基准协议。对于飞机,必须考虑网络移动性(NEMO)扩展到MIPv6,但是该协议尚未提供任何路由优化过程,尽管存在许多建议。我们提出了一种新的机制,补充了NEMO现有的路线优化建议,从而使其在航空环境中可行。这种方法基于证书,它应该允许减少信令开销和切换延迟,同时提供更高级别的安全性。
{"title":"Network mobility route optimization with certificate-based authentication","authors":"C. Bauer","doi":"10.1109/ICUFN.2009.5174309","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174309","url":null,"abstract":"The International Civil Aviation Organization has adopted IPv6 as the network protocol for the future Aeronautical Telecommunications Network, with Mobile IPv6 (MIPv6) as the baseline protocol to provide IP mobility. For aircraft, the Network Mobility (NEMO) extension to MIPv6 has to be considered, but this protocol does not yet provide any Route Optimization procedure, although many proposals do exist. We present a new mechanism that complements an existing Route Optimization proposal for NEMO, thus making it feasible for the aeronautical environment. This approach is based on certificates that should allow reducing signalling overhead and handover delay while providing a higher level of security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Rule-based auditing system for software security assurance 基于规则的软件安全保障审计系统
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174311
C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi
We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.
如果无处不在的计算时代到来,我们可以使用各种形式的信息和软件,而不受地点和时间的限制。但是,它的功能失调正在引发个人信息泄露、黑客攻击、病毒扩散等安全问题。特别是在普适计算环境下,恶意软件的传播造成了严重的危害。我们研究了恶意代码检测和软件漏洞检测工具来防止这种情况。但是,现有的检测工具由于在规范范围上的局限性,并不适用于通用软件。此外,它们无法检测到新出现的恶意代码。我们必须对新的恶意代码进行模式更新,因为它们使用了简单的模式匹配技术。本文提出了基于规则的审计系统,通过分析目标代码的结构,将其定义为规则,检测恶意代码和软件漏洞。由于该审计系统将被通用的软件审计系统所使用,从而对源代码的安全性进行考量,因此可以构建安全的泛在计算环境。
{"title":"Rule-based auditing system for software security assurance","authors":"C. Jang, Jeongseok Kim, H. Jang, Sundo Park, B. Jang, Bong-hoi Kim, E. Choi","doi":"10.1109/ICUFN.2009.5174311","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174311","url":null,"abstract":"We can use information and software of various forms without being restricted for place and time if ubiquitous computing age comes. However, its dysfunction is causing security problems such as outflow of personal information, hacking, diffusion of virus. Specially, dissemination of software that has malicious purpose in ubiquitous computing environment causes serious damage. We have studied about malicious code detection and software vulnerability detection tool to prevent this. But, existent detection tools are not suited to general software, because they are limitative in specification area. In addition, they cannot detect a newly appeared malicious code. We must update pattern of new malicious code, because they use a simple pattern matching technique. In this paper, we propose rule-based auditing system that analyzes structure of target code to solve these problems, define this as rule, and detect malicious codes and software vulnerabilities. Proposed auditing system can construct secure ubiquitous computing environment, because it will be used by a common software audit system that reason about source codes security.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Convergent design in ubiquitous computing 普适计算中的融合设计
Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174292
Z. Segall
Ubiquitous computing and networking have been fertile grounds for innovation while presenting the challenge of realizing a superior user experience and a viable business model. Unassumingly exploring both the difficult task of innovation and the user experience design, this short contribution will briefly document the emergent trend of combining science and engineering with fields of studies that are considered non-science and non-engineering such as design, fashion and visual arts. The thesis of this work is that ubiquitous computing and networking could substantially benefit from such integrative approach.
无处不在的计算和网络一直是创新的沃土,同时也提出了实现卓越用户体验和可行商业模式的挑战。谦逊地探索创新和用户体验设计的困难任务,这篇简短的贡献将简要地记录科学和工程与被认为是非科学和非工程的研究领域(如设计,时尚和视觉艺术)相结合的新兴趋势。这项工作的主题是,无处不在的计算和网络可以从这种综合方法中实质性地受益。
{"title":"Convergent design in ubiquitous computing","authors":"Z. Segall","doi":"10.1109/ICUFN.2009.5174292","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174292","url":null,"abstract":"Ubiquitous computing and networking have been fertile grounds for innovation while presenting the challenge of realizing a superior user experience and a viable business model. Unassumingly exploring both the difficult task of innovation and the user experience design, this short contribution will briefly document the emergent trend of combining science and engineering with fields of studies that are considered non-science and non-engineering such as design, fashion and visual arts. The thesis of this work is that ubiquitous computing and networking could substantially benefit from such integrative approach.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 First International Conference on Ubiquitous and Future Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1