Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494007
Young-Bag Moon, Jong Young Lee, Sang Joon Park
The configuration of the u-sensor network is comprised of sink node, and the sensor node and gateway so that the USN (ubiquitous sensor network) application service can be provided. The middleware function need for a sink and sensor node for the sensor network management In the middleware function, it is required of the network topology management, the sensing data processing, a failure and power management, and etc. And it is designed in order to perform the network management through the u- sensor network overall. In this paper, it described about the design about the topology, event data, failure, power management for a sink and sensor node management and implementation issue. The topology configuration and all kinds of management data of sensor network nodes were shown through an implementation in the PAN network management GUI (graphical user interface).
{"title":"Sensor Network Node Management and Implementation","authors":"Young-Bag Moon, Jong Young Lee, Sang Joon Park","doi":"10.1109/ICACT.2008.4494007","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494007","url":null,"abstract":"The configuration of the u-sensor network is comprised of sink node, and the sensor node and gateway so that the USN (ubiquitous sensor network) application service can be provided. The middleware function need for a sink and sensor node for the sensor network management In the middleware function, it is required of the network topology management, the sensing data processing, a failure and power management, and etc. And it is designed in order to perform the network management through the u- sensor network overall. In this paper, it described about the design about the topology, event data, failure, power management for a sink and sensor node management and implementation issue. The topology configuration and all kinds of management data of sensor network nodes were shown through an implementation in the PAN network management GUI (graphical user interface).","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133841941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493851
Daesub Yoon, Jong-woo Choi, Hyunsuk Kim, Juwan Kim
With the proliferation of vehicles and advancement of information technology, the technology of telematics, which provides valuable services to people by collecting and analyzing the information from drivers, vehicles and Telematics environments (e.g. traffic information, road condition, weather information, etc.), has been a hot research area in IT and automotive recently. There are needs for telematics makes more profitable. Telematics based insurance services could be one possible business model. In this paper, we have investigated trends of telematics based insurance services in the industry and discussed required technologies for telematics based insurance services. Finally, we summarized the framework for insurance telematics which we had developed.
{"title":"Future Automotive Insurance System based on Telematics Technology","authors":"Daesub Yoon, Jong-woo Choi, Hyunsuk Kim, Juwan Kim","doi":"10.1109/ICACT.2008.4493851","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493851","url":null,"abstract":"With the proliferation of vehicles and advancement of information technology, the technology of telematics, which provides valuable services to people by collecting and analyzing the information from drivers, vehicles and Telematics environments (e.g. traffic information, road condition, weather information, etc.), has been a hot research area in IT and automotive recently. There are needs for telematics makes more profitable. Telematics based insurance services could be one possible business model. In this paper, we have investigated trends of telematics based insurance services in the industry and discussed required technologies for telematics based insurance services. Finally, we summarized the framework for insurance telematics which we had developed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494204
S. Na, Dong-Uk Kim, Yoe-Jin Yoon, D. Shin
In ubiquitous computing environments, the basic information such as types or locations of services should be provided in advance to use distributed services and devices efficiently. Using a combination of developed agent technology and service discovery to efficiently and flexibly manage distributed services, devices, and users is a trend. In this paper, we analyze the DF's searching method and designed ubiquitous location-based service in context-aware environment, because context-aware environment provides a suitable method to gather requested information in an appropriate way.
{"title":"Design of Location-based Directory Facilitator in Context-Aware Environment","authors":"S. Na, Dong-Uk Kim, Yoe-Jin Yoon, D. Shin","doi":"10.1109/ICACT.2008.4494204","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494204","url":null,"abstract":"In ubiquitous computing environments, the basic information such as types or locations of services should be provided in advance to use distributed services and devices efficiently. Using a combination of developed agent technology and service discovery to efficiently and flexibly manage distributed services, devices, and users is a trend. In this paper, we analyze the DF's searching method and designed ubiquitous location-based service in context-aware environment, because context-aware environment provides a suitable method to gather requested information in an appropriate way.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116615853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493785
Young-Keum Song, Dongwoo Kim
Ranging schemes have been used for timing synchronization and power control between a base station (BS) and personal subscriber stations (PSS). They are also used for bandwidth request and handoff in WiBro systems. In this paper, we present the ranging mechanism in WiBro in a view of contention resolution for ranging access. Performances of success rate and delay are assessed since they greatly affect the system capability. We investigate the performance by simulation using the parameters specified in a WiBro standard. A result shows that the average delay in ranging access is in a range of 110-700 ms depending on different scenarios.
{"title":"Performance of Ranging Channel Accesses in WiBro Systems","authors":"Young-Keum Song, Dongwoo Kim","doi":"10.1109/ICACT.2008.4493785","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493785","url":null,"abstract":"Ranging schemes have been used for timing synchronization and power control between a base station (BS) and personal subscriber stations (PSS). They are also used for bandwidth request and handoff in WiBro systems. In this paper, we present the ranging mechanism in WiBro in a view of contention resolution for ranging access. Performances of success rate and delay are assessed since they greatly affect the system capability. We investigate the performance by simulation using the parameters specified in a WiBro standard. A result shows that the average delay in ranging access is in a range of 110-700 ms depending on different scenarios.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494205
Sung-Woo Choi, Sangsung Choi
The MB-OFDM UWB is a wireless technology that can transmit information at the maximum data rate of 480 Mbps. In this system, channelization for different piconets is achieved by using different time-frequency codes for different piconets. So, when a new device wants to enter a present piconet, it should detect the time-frequency code of that piconet. we propose a new method that controls physical layer using a modified time-frequency code, which makes it easy to detect the used time-frequency code.
{"title":"Time-Frequency Code Detection in UWB system","authors":"Sung-Woo Choi, Sangsung Choi","doi":"10.1109/ICACT.2008.4494205","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494205","url":null,"abstract":"The MB-OFDM UWB is a wireless technology that can transmit information at the maximum data rate of 480 Mbps. In this system, channelization for different piconets is achieved by using different time-frequency codes for different piconets. So, when a new device wants to enter a present piconet, it should detect the time-frequency code of that piconet. we propose a new method that controls physical layer using a modified time-frequency code, which makes it easy to detect the used time-frequency code.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493776
Kyeseon Lee, Nae-Su Kim, D. Kim
In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.
{"title":"Experience of USN MAC based on 424MHz band IEEE 802.15.4","authors":"Kyeseon Lee, Nae-Su Kim, D. Kim","doi":"10.1109/ICACT.2008.4493776","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493776","url":null,"abstract":"In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493944
Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim
For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.
{"title":"Adaptive Inter-Cell Interference Management for Downlink FH-OFDMA Systems","authors":"Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim","doi":"10.1109/ICACT.2008.4493944","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493944","url":null,"abstract":"For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494089
Hyun-Kyung Oh, Seunghun Jin
As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.
{"title":"The Security Limitations of SSO in OpenID","authors":"Hyun-Kyung Oh, Seunghun Jin","doi":"10.1109/ICACT.2008.4494089","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494089","url":null,"abstract":"As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494090
M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng
Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.
{"title":"Towards A Secure Distribute Storage System","authors":"M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng","doi":"10.1109/ICACT.2008.4494090","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494090","url":null,"abstract":"Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493711
Vu Truong Thanh, Y. Urano
In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.
{"title":"Link-based service customization for NGN","authors":"Vu Truong Thanh, Y. Urano","doi":"10.1109/ICACT.2008.4493711","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493711","url":null,"abstract":"In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}