Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746729
Songhe Zhao, C. Shoniregun, C. Imafidon
This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.
{"title":"Addressing the vulnerability of the 4-way handshake of 802.11i","authors":"Songhe Zhao, C. Shoniregun, C. Imafidon","doi":"10.1109/ICDIM.2008.4746729","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746729","url":null,"abstract":"This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746807
A. Cheddad, J. Condell, K. Curran, P. Kevitt
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose a solution to this real world problem through a 1D hash algorithm coupled with 2D irFFT (irreversible fast Fourier transform) to encrypt digital documents in the 2D spatial domain. This method is described elsewhere in [1]. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. Our proposal not only points out forgery but also lets a jury or a forensics expert have access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.
{"title":"Combating digital document forgery using new secure information hiding algorithm","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746807","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746807","url":null,"abstract":"The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose a solution to this real world problem through a 1D hash algorithm coupled with 2D irFFT (irreversible fast Fourier transform) to encrypt digital documents in the 2D spatial domain. This method is described elsewhere in [1]. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. Our proposal not only points out forgery but also lets a jury or a forensics expert have access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746822
Mohammad Nikoupour, A. Nikoupour, M. Dehghan
Video streaming over wireless ad-hoc networks requires appropriate routing and rate allocation mechanisms that efficiently adapt to the characteristics of such environments. The special features of ad-hoc networks also motivate us to introduce proper mechanisms in video coding, error concealment and various related areas. In this paper, we propose a framework for video streaming over wireless ad-hoc networks which utilizes the cooperation among network layers to perform the mentioned activities. We discuss the key parameters to be noticed in such a framework and explore several approaches in video streaming and rate allocation and select the suitable methods for our purpose. Focusing on the retransmission of lost video frames in response to ARQ requests, we try to minimize the delay between sending the ARQ request and receiving the lost frame, by selecting a route in which a node assists us in video streaming. Simulation results show the feasibility and the efficiency of the proposed framework.
{"title":"A cross-layer framework for video streaming over wireless ad-hoc networks","authors":"Mohammad Nikoupour, A. Nikoupour, M. Dehghan","doi":"10.1109/ICDIM.2008.4746822","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746822","url":null,"abstract":"Video streaming over wireless ad-hoc networks requires appropriate routing and rate allocation mechanisms that efficiently adapt to the characteristics of such environments. The special features of ad-hoc networks also motivate us to introduce proper mechanisms in video coding, error concealment and various related areas. In this paper, we propose a framework for video streaming over wireless ad-hoc networks which utilizes the cooperation among network layers to perform the mentioned activities. We discuss the key parameters to be noticed in such a framework and explore several approaches in video streaming and rate allocation and select the suitable methods for our purpose. Focusing on the retransmission of lost video frames in response to ARQ requests, we try to minimize the delay between sending the ARQ request and receiving the lost frame, by selecting a route in which a node assists us in video streaming. Simulation results show the feasibility and the efficiency of the proposed framework.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746702
A. Messina, M. Montagnuolo
Nowadays, the global diffusion of the Internet is enabling the distribution of informative content through dynamic media such as RSS feeds and blogs. At the same time, the decreasing cost of electronic devices is increasing the pervasive availability of the same informative content in the form of digital audiovisual items. Hence, efficient and low-cost solutions for semantic aggregation of heterogeneous multimedia content are needed, in order to enable users to retrieve the desired information from this variety of channels. In this paper, we present an unsupervised framework for content-based Web newspaper articles and broadcast news stories aggregation and retrieval. The core of our system is based on a hybrid clustering algorithm that uses RSS feeds and television newscasts programmes as information sources and builds up a multimodal service made up of items including both contributions. Extensive experiments prove the effectiveness of our method.
{"title":"Content-based RSS and broadcast news streams aggregation and retrieval","authors":"A. Messina, M. Montagnuolo","doi":"10.1109/ICDIM.2008.4746702","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746702","url":null,"abstract":"Nowadays, the global diffusion of the Internet is enabling the distribution of informative content through dynamic media such as RSS feeds and blogs. At the same time, the decreasing cost of electronic devices is increasing the pervasive availability of the same informative content in the form of digital audiovisual items. Hence, efficient and low-cost solutions for semantic aggregation of heterogeneous multimedia content are needed, in order to enable users to retrieve the desired information from this variety of channels. In this paper, we present an unsupervised framework for content-based Web newspaper articles and broadcast news stories aggregation and retrieval. The core of our system is based on a hybrid clustering algorithm that uses RSS feeds and television newscasts programmes as information sources and builds up a multimodal service made up of items including both contributions. Extensive experiments prove the effectiveness of our method.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746772
Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim
Context-aware services have been introduced into mobile devices, such as cellular phones. Context management and rule processing are the key research issues for the resource-limited devices to have context-aware capability. In this paper, we introduce a context-aware rule processing engine, called MiRE (minimal rule engine). The engine implements the minimum cores of the conventional rule processing facilities and some special policies to achieve resource-saving and light-weight inference engine suitable for resource-limited mobile devices. MiRE, as a part of context-aware middleware system, provides a flexible architecture to adopt various context-aware applications while rules and contexts are dynamically registered at run-time. It maintains the amount of context (i.e., facts) and rules to be optimal in order to save computing resources and processing time. Its design strategy allows MiRE to be conveniently equipped into resource-limited context-aware mobile devices. The performance evaluation carried out on a context-aware cellular phone shows the intended efficiency has been well achieved.
{"title":"MiRE: A Minimal Rule Engine for context-aware mobile devices","authors":"Chang-Suk Choi, Insuk Park, S. Hyun, Dongman Lee, D. H. Sim","doi":"10.1109/ICDIM.2008.4746772","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746772","url":null,"abstract":"Context-aware services have been introduced into mobile devices, such as cellular phones. Context management and rule processing are the key research issues for the resource-limited devices to have context-aware capability. In this paper, we introduce a context-aware rule processing engine, called MiRE (minimal rule engine). The engine implements the minimum cores of the conventional rule processing facilities and some special policies to achieve resource-saving and light-weight inference engine suitable for resource-limited mobile devices. MiRE, as a part of context-aware middleware system, provides a flexible architecture to adopt various context-aware applications while rules and contexts are dynamically registered at run-time. It maintains the amount of context (i.e., facts) and rules to be optimal in order to save computing resources and processing time. Its design strategy allows MiRE to be conveniently equipped into resource-limited context-aware mobile devices. The performance evaluation carried out on a context-aware cellular phone shows the intended efficiency has been well achieved.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746823
Wolfgang Kahlig
ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation are not focussed. A method for handling of complex projects is UML, the ldquoUnified Modeling Languagerdquo. This tool could be applied also for the establishing, administration and further development of a new and modern building of law.
{"title":"Legal cognitive decision processing towards a dynamic taxonomy","authors":"Wolfgang Kahlig","doi":"10.1109/ICDIM.2008.4746823","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746823","url":null,"abstract":"ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation are not focussed. A method for handling of complex projects is UML, the ldquoUnified Modeling Languagerdquo. This tool could be applied also for the establishing, administration and further development of a new and modern building of law.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746777
Samson Omosule, C. Shoniregun, D. Preston
Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that constitute students trust factors are found to vary across cultures with regards to their respective parametric values.
{"title":"A framework for culture influence Virtual Learning Environments trust","authors":"Samson Omosule, C. Shoniregun, D. Preston","doi":"10.1109/ICDIM.2008.4746777","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746777","url":null,"abstract":"Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that constitute students trust factors are found to vary across cultures with regards to their respective parametric values.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746727
Ying Su, Jie Peng, Zhanming Jin
Disaster management depends on large volumes of comprehensive, accurate, relevant, on-time geo-information that various organizations systematically create and maintain. One cannot assure geo-information quality (G-IQ) without first being able to measure it meaningfully and establishing a causal connection between the source of G-IQ change, the G-IQ problem types, the types of activities affected, and their implications. In this article we propose a G-IQ assurance framework. In contrast to context-specific IQ assurance models, which usually focus on a few variables determined by local needs, our framework consists of comprehensive typologies of IQ problems, related activities, and a taxonomy of IQ dimensions organized in a systematic way based on semiotic theories and practices. The framework can be used as a knowledge resource and as a guide for developing G-IQ measurement models for many geo-information technologies which can offer a variety of opportunities to aid management and recovery in the aftermath of disasters. The framework was validated and refined by enhancing G-IQ generated by remote sensing through the technologies of photogrammetry.
{"title":"Geo-information quality assurance in disaster management","authors":"Ying Su, Jie Peng, Zhanming Jin","doi":"10.1109/ICDIM.2008.4746727","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746727","url":null,"abstract":"Disaster management depends on large volumes of comprehensive, accurate, relevant, on-time geo-information that various organizations systematically create and maintain. One cannot assure geo-information quality (G-IQ) without first being able to measure it meaningfully and establishing a causal connection between the source of G-IQ change, the G-IQ problem types, the types of activities affected, and their implications. In this article we propose a G-IQ assurance framework. In contrast to context-specific IQ assurance models, which usually focus on a few variables determined by local needs, our framework consists of comprehensive typologies of IQ problems, related activities, and a taxonomy of IQ dimensions organized in a systematic way based on semiotic theories and practices. The framework can be used as a knowledge resource and as a guide for developing G-IQ measurement models for many geo-information technologies which can offer a variety of opportunities to aid management and recovery in the aftermath of disasters. The framework was validated and refined by enhancing G-IQ generated by remote sensing through the technologies of photogrammetry.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746751
Zohaib Hassan
This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements. It also highlights how Android fulfills the subject requirements and considerations.
{"title":"Ubiquitous computing and android","authors":"Zohaib Hassan","doi":"10.1109/ICDIM.2008.4746751","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746751","url":null,"abstract":"This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements. It also highlights how Android fulfills the subject requirements and considerations.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746763
Dannan Lin, C. Shoniregun, G. Akmayeva
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.
{"title":"The softphone security","authors":"Dannan Lin, C. Shoniregun, G. Akmayeva","doi":"10.1109/ICDIM.2008.4746763","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746763","url":null,"abstract":"The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}