Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.25
Fahad Aijaz, S. Adeli, B. Walke
The concept of mobile Web services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. A Web service based middleware for mobile applications is a promising platform to accelerate the application development for mobile systems. This paper introduces a middleware for time independent Mob-WS that avoids the overheads of long durational synchronous communication. Details of communication architecture and interaction among the middleware components is presented and discussed. Due to the transport neutral nature of SOAP, the Bluetooth initial short-ranged transport protocol binding is briefly presented. Finally, some preliminary processing latencies are shown followed by conclusion.
{"title":"Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport Protocols","authors":"Fahad Aijaz, S. Adeli, B. Walke","doi":"10.1109/NTMS.2008.ECP.25","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.25","url":null,"abstract":"The concept of mobile Web services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. A Web service based middleware for mobile applications is a promising platform to accelerate the application development for mobile systems. This paper introduces a middleware for time independent Mob-WS that avoids the overheads of long durational synchronous communication. Details of communication architecture and interaction among the middleware components is presented and discussed. Due to the transport neutral nature of SOAP, the Bluetooth initial short-ranged transport protocol binding is briefly presented. Finally, some preliminary processing latencies are shown followed by conclusion.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.76
H. Cho, C. Lee, G. Hwang
In this paper, we analyze the performances of a cooperative ARQ protocol under Poisson arrivals and the time correlated Rayleigh fading channel environment. A two dimensional discrete time Markov chain is formulated for the analysis. Using the steady state analysis of the Markov chain, the average frame latency and the moment generating function of the service time of a frame are derived. We validate our analytical results by comparing them with simulation results. From our analysis, we show that the cooperative ARQ protocol outperforms the non-cooperative protocol. In addition, we see that the effect of time correlation of the fading channel is not negligible.
{"title":"Performance Analysis of Single Relay Cooperative ARQ protocol under Time Correlated Rayleigh Fading Channel","authors":"H. Cho, C. Lee, G. Hwang","doi":"10.1109/NTMS.2008.ECP.76","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.76","url":null,"abstract":"In this paper, we analyze the performances of a cooperative ARQ protocol under Poisson arrivals and the time correlated Rayleigh fading channel environment. A two dimensional discrete time Markov chain is formulated for the analysis. Using the steady state analysis of the Markov chain, the average frame latency and the moment generating function of the service time of a frame are derived. We validate our analytical results by comparing them with simulation results. From our analysis, we show that the cooperative ARQ protocol outperforms the non-cooperative protocol. In addition, we see that the effect of time correlation of the fading channel is not negligible.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.36
R. Khatoun, G. Doyen, D. Gaïti, R. Saad, A. Serhrouchni
Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture for an intrusion detection approach. The central point of this paper is the alert correlation among Snort intrusion detection systems (IDS). We believe that this approach optimizes the detection performance in a completely distributed fashion by relying on Pastry overlay network as indexing and routing protocol. We propose novel approach that will be improved in the future work.
{"title":"Decentralized Alerts Correlation Approach for DDoS Intrusion Detection","authors":"R. Khatoun, G. Doyen, D. Gaïti, R. Saad, A. Serhrouchni","doi":"10.1109/NTMS.2008.ECP.36","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.36","url":null,"abstract":"Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture for an intrusion detection approach. The central point of this paper is the alert correlation among Snort intrusion detection systems (IDS). We believe that this approach optimizes the detection performance in a completely distributed fashion by relying on Pastry overlay network as indexing and routing protocol. We propose novel approach that will be improved in the future work.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Most MANET security solutions identify and exclude malicious and selfish nodes. These mechanisms rely on local monitoring tools to detect untrustworthy nodes and then spread trust information through recommendations. In this paper we apply a Bayesian model [1] to improve MANET security. We classify nodes behavior relying on a decision based on a probabilistic Bayesian model. The novelty of our approach is that it classifies nodes based on distant observations. We describe statistical parameters like Accuracy, Error and the Total Cost Ratio that are used to evaluate the efficiency of the filter through a set of simulations of an attacked pure ad hoc network.
{"title":"A Bayesian Filter to Detect Misbehaving Nodes in MANETs","authors":"Youcef Beghriche, V. Toubiana, H. Labiod","doi":"10.1109/NTMS.2008.ECP.7","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.7","url":null,"abstract":"Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Most MANET security solutions identify and exclude malicious and selfish nodes. These mechanisms rely on local monitoring tools to detect untrustworthy nodes and then spread trust information through recommendations. In this paper we apply a Bayesian model [1] to improve MANET security. We classify nodes behavior relying on a decision based on a probabilistic Bayesian model. The novelty of our approach is that it classifies nodes based on distant observations. We describe statistical parameters like Accuracy, Error and the Total Cost Ratio that are used to evaluate the efficiency of the filter through a set of simulations of an attacked pure ad hoc network.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.40
N. Lopes, M. J. Nicolau, Alexandre J. T. Santos
The next generation of mobile phones will be probably all-IP based enabling users to access Internet services. In order to make this possible a satisfactory quality of service, at least equal to the fixed Internet, must be ensured. To achieve this goal an end-to-end QoS system must be constructed. Another fact is the dominance of IP over other technologies due, in large measure, to its characteristic of working with heterogeneous technologies. Consequently, being IP the common denominator on a heterogeneous environment, it is important to develop end-to-end IP QoS guarantees for the different applications over distinct access technologies. This is particularly important for cellular wireless networks due to the ever growing expansion of mobile phone users. One way to contribute to this goal is to apply DiffServ QoS mechanisms to UMTS technology in order to model an End-to-End QoS communication system. A mapping of DiffServ CodePoints into UMTS classes can be applied in order to get efficient PHB configurations. This paper proposes an architecture to support end-to-end quality of service to several application services running on mobile UMTS user agents and communicating with servers located in a wired internet. The proposed architecture is based on a DiffServ model, where QoS parameters are set either by the user agent or by the SGSN. In particular, RED queue management and PRI or WRR scheduling policies are enforced. Different UMTS traffic classes are mapped into different DiffServ parameters. The performance of this architecture has been evaluated by simulation using NS, assuming different network load scenarios. In particular, the delay and packet loss experienced by VoIP, Video, FTP and HTTP traffic are evaluated in the cases of PRI and WRR scheduling policies, and compared to those measured when DiffServ is not implemented. Finally, a revenue function to estimate the profits that an ISP could expect by using a DiffServ implementation on IP UMTS core routers is proposed.
{"title":"Efficiency of PRI and WRR DiffServ Scheduling Mechanisms for Real-Time Services on UMTS Environment","authors":"N. Lopes, M. J. Nicolau, Alexandre J. T. Santos","doi":"10.1109/NTMS.2008.ECP.40","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.40","url":null,"abstract":"The next generation of mobile phones will be probably all-IP based enabling users to access Internet services. In order to make this possible a satisfactory quality of service, at least equal to the fixed Internet, must be ensured. To achieve this goal an end-to-end QoS system must be constructed. Another fact is the dominance of IP over other technologies due, in large measure, to its characteristic of working with heterogeneous technologies. Consequently, being IP the common denominator on a heterogeneous environment, it is important to develop end-to-end IP QoS guarantees for the different applications over distinct access technologies. This is particularly important for cellular wireless networks due to the ever growing expansion of mobile phone users. One way to contribute to this goal is to apply DiffServ QoS mechanisms to UMTS technology in order to model an End-to-End QoS communication system. A mapping of DiffServ CodePoints into UMTS classes can be applied in order to get efficient PHB configurations. This paper proposes an architecture to support end-to-end quality of service to several application services running on mobile UMTS user agents and communicating with servers located in a wired internet. The proposed architecture is based on a DiffServ model, where QoS parameters are set either by the user agent or by the SGSN. In particular, RED queue management and PRI or WRR scheduling policies are enforced. Different UMTS traffic classes are mapped into different DiffServ parameters. The performance of this architecture has been evaluated by simulation using NS, assuming different network load scenarios. In particular, the delay and packet loss experienced by VoIP, Video, FTP and HTTP traffic are evaluated in the cases of PRI and WRR scheduling policies, and compared to those measured when DiffServ is not implemented. Finally, a revenue function to estimate the profits that an ISP could expect by using a DiffServ implementation on IP UMTS core routers is proposed.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131152625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.82
Faouzia Wadjinny, D. Chiadmi
Digital libraries are more and more available on the web. Unfortunately, their heterogeneity and distribution make retrieving information from them a difficult process. To overcome these difficulties, several solutions have been proposed. We adopt a virtual data integration approach based on mediation to access various digital libraries. In this context, a query posed to the mediator need to be translated into a sequence of queries to the underlying data sources. In a heterogeneous environment, with sources of diverse and limited query capabilities, not all of the translations are feasible. In this paper, we study the problem of finding feasible and efficient query plans to retrieve data from digital libraries. We present the formalism that we use to describe data sources capabilities. We propose an algorithm for producing equivalent query plans and a cost model for choosing the optimal plan.
{"title":"Query Optimization in a Mediator for Digital Libraries","authors":"Faouzia Wadjinny, D. Chiadmi","doi":"10.1109/NTMS.2008.ECP.82","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.82","url":null,"abstract":"Digital libraries are more and more available on the web. Unfortunately, their heterogeneity and distribution make retrieving information from them a difficult process. To overcome these difficulties, several solutions have been proposed. We adopt a virtual data integration approach based on mediation to access various digital libraries. In this context, a query posed to the mediator need to be translated into a sequence of queries to the underlying data sources. In a heterogeneous environment, with sources of diverse and limited query capabilities, not all of the translations are feasible. In this paper, we study the problem of finding feasible and efficient query plans to retrieve data from digital libraries. We present the formalism that we use to describe data sources capabilities. We propose an algorithm for producing equivalent query plans and a cost model for choosing the optimal plan.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.51
E. Barka, K. Shuaib, H. Chamas
The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. There has been extensive work on improving the security of IEEE Standard 802.16 for both fixed and mobile networks in PMP mode, but thus far there is scarcity of research on security in IEEE 802.16, and its impact on the performance on such networks. In this Paper, we investigate the impact of security, specifically, IPsec on the performance of the 802.16. We explore and analyze the impact of different implementations of encryption techniques, using the two IPsec transmission modes, Our analysis is based on simulation, using the well-known Qualnet software.
{"title":"Impact of IPSec on the Performance of the IEEE 802.16 Wireless Networks","authors":"E. Barka, K. Shuaib, H. Chamas","doi":"10.1109/NTMS.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.51","url":null,"abstract":"The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. There has been extensive work on improving the security of IEEE Standard 802.16 for both fixed and mobile networks in PMP mode, but thus far there is scarcity of research on security in IEEE 802.16, and its impact on the performance on such networks. In this Paper, we investigate the impact of security, specifically, IPsec on the performance of the 802.16. We explore and analyze the impact of different implementations of encryption techniques, using the two IPsec transmission modes, Our analysis is based on simulation, using the well-known Qualnet software.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.11
A. Rebai, Mariem Fliss, S. Jarboui, S. Hanafi
The IEEE 802.11 WLAN becomes more applied for multimedia traffics that are very strict in terms of link rate and transmission delay performance. In this paper, the authors will study link adaptation requirements to allow the requested multimedia quality-based communications. The efficiency of rate control diagrams is linked to the fast channel variation response. A new dynamic time-based link adaptation mechanism, called MAARF (modified adaptive auto rate fallback), is proposed. Beside the transmission frame results, the new model implements round trip time (RTT) mechanism to choose adequately instantaneous link rate. This proposed model is evaluated with ARF (auto rate fallback) and AARF (adaptive ARF) schemes. Simulation results are given to illustrate the quality improvement of transmission link over Wi-Fi networks.
IEEE 802.11无线局域网越来越多地应用于对链路速率和传输延迟性能要求非常严格的多媒体业务。在本文中,作者将研究链路适应要求,以允许所要求的基于多媒体质量的通信。速率控制图的效率与快速信道变化响应有关。提出了一种新的基于时间的动态链路自适应机制MAARF (modified adaptive auto rate fallback)。除了传输帧结果外,新模型还实现了往返时间(RTT)机制,以选择适当的瞬时链路速率。采用自适应ARF (ARF)和自适应ARF (ARF)两种方案对该模型进行了评价。仿真结果说明了Wi-Fi网络传输链路质量的提高。
{"title":"A New Link Adaptation Scheme for IEEE 802.11 WLANs","authors":"A. Rebai, Mariem Fliss, S. Jarboui, S. Hanafi","doi":"10.1109/NTMS.2008.ECP.11","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.11","url":null,"abstract":"The IEEE 802.11 WLAN becomes more applied for multimedia traffics that are very strict in terms of link rate and transmission delay performance. In this paper, the authors will study link adaptation requirements to allow the requested multimedia quality-based communications. The efficiency of rate control diagrams is linked to the fast channel variation response. A new dynamic time-based link adaptation mechanism, called MAARF (modified adaptive auto rate fallback), is proposed. Beside the transmission frame results, the new model implements round trip time (RTT) mechanism to choose adequately instantaneous link rate. This proposed model is evaluated with ARF (auto rate fallback) and AARF (adaptive ARF) schemes. Simulation results are given to illustrate the quality improvement of transmission link over Wi-Fi networks.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121589565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.44
Ahmad S. Al-Mogren
It is essential to manage data in the wireless environment. Through the use of dissemination technique, data may be retrieved by wireless users in an efficient manner. In this paper, I show a description of an architecture which is designed to provide a power-saving for the mobile clients' units in a multichannel dissemination-based network. I show how a suitable system fits in the overall telecommunication network. The aim of the system is to allow the clients to get the needed data in an efficient way, and at the same time to allow the participation of clients in updating the content of the disseminated data. A performance study shows that the power consumption, space overhead, and response time associated with the suggested approach is far less than other previous techniques.
{"title":"Energy Adaptive Approach In a Multi-Channel Dissemination-Based Network","authors":"Ahmad S. Al-Mogren","doi":"10.1109/NTMS.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.44","url":null,"abstract":"It is essential to manage data in the wireless environment. Through the use of dissemination technique, data may be retrieved by wireless users in an efficient manner. In this paper, I show a description of an architecture which is designed to provide a power-saving for the mobile clients' units in a multichannel dissemination-based network. I show how a suitable system fits in the overall telecommunication network. The aim of the system is to allow the clients to get the needed data in an efficient way, and at the same time to allow the participation of clients in updating the content of the disseminated data. A performance study shows that the power consumption, space overhead, and response time associated with the suggested approach is far less than other previous techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.24
E. Lakshika, C. Keppitiyagama, Dulan Wathugala
Aspect-oriented programming (AOP) is a programming paradigm which enhances the concept of "separation of concerns" by introducing a mechanism to modularize crosscutting concerns in a better way. While AOP based extensions have earned a superior popularity in various domains, for some domains, AOP is still immature. The domain of wireless sensor networks is such an area where application of AOP techniques is lacking. Currently, almost all the programming languages for implementing wireless sensor networks do not provide mechanisms to modularize crosscutting concerns in a precise way. In this paper, we present the design and development of AOnesC language, which is an aspect-oriented extension to nesC language. Since nesC language plays a major role in the domain of wireless sensor networks, we expect this AOP based extension would enable sensor network application developers to gain benefits of AOP techniques.
{"title":"AOnesC: An Aspect-Oriented Extension to nesC","authors":"E. Lakshika, C. Keppitiyagama, Dulan Wathugala","doi":"10.1109/NTMS.2008.ECP.24","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.24","url":null,"abstract":"Aspect-oriented programming (AOP) is a programming paradigm which enhances the concept of \"separation of concerns\" by introducing a mechanism to modularize crosscutting concerns in a better way. While AOP based extensions have earned a superior popularity in various domains, for some domains, AOP is still immature. The domain of wireless sensor networks is such an area where application of AOP techniques is lacking. Currently, almost all the programming languages for implementing wireless sensor networks do not provide mechanisms to modularize crosscutting concerns in a precise way. In this paper, we present the design and development of AOnesC language, which is an aspect-oriented extension to nesC language. Since nesC language plays a major role in the domain of wireless sensor networks, we expect this AOP based extension would enable sensor network application developers to gain benefits of AOP techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}