ICETE 2005 Abstracts


Area 1 - Global Communication Information Systems and Services

Full Papers
Paper Nr: 12
Title:

A SECURE FRAMEWORK FOR MANAGING TRANSACTIONAL PROPERTIES OF BUSINESS OBJECTS

Authors:

Charles A. Shoniregun , Ziyang Duan, Subhra Bose and Alex Logvynovskiy

Abstract: A business object is a set of well-structured, persistent data associated with some predefined transactional operations. Maintaining the transactional correctness of business objects is very important, especially in financial applications. The object’s correctness has to be guaranteed at any time during the lifecycle of the object. This requires that each simple operation is correct, i.e., satisfies the ACID property, and the object is in acceptable states before and after each operation. The correctness of each simple transaction can be secured and guaranteed by using a transactional database or a transaction monitor. However, the combined effect of executing a set of simple transactions may violate some business rules and leave the object in an unacceptable state. The proposed model is based on Heirarchical Statechart to specify the allowable states and transitions on a business object during its life cycle. The paper describes an XML-based framework to support application development based on this model. The framework includes an XML language for model specification, a set of tools for model definition, testing and simulation, and a set of APIs to provide business object management functionalities at runtime. The model and framework allows secure transactional properties of a business object to be defined formally and declaratively, and provides correctness guarantees at runtime. The framework facilitates fast product development and integration in a service-oriented architectural model, and provides great flexibilities for persisting data in either XML or relational databases. The experience of how to use the framework in developing a financial transactions system and the tradeoffs is based on comparison between XML and relational databases.
Download

Paper Nr: 80
Title:

TRANSFORMATION OF TRADITIONAL BUSINESS TO ELECTRONIC BUSINESS - A transformation cum maturity model and transformation matrix

Authors:

Asif A. Munshi and Fareed Hussain

Abstract: Electronic business provides many benefits to organizations that embrace on it. It is true that ebusiness improve business processes, integrate business processes and its corresponding value chain, give speed to internal and external organizational activities etc, but it poses the greatest challenge to today’s organizations to transform their traditional businesses into electronic business. To assist organizations, in making successful transformation to ebusiness, in this paper, we first distinguish between electronic commerce and electronic business on the basis of three parameters of scope, support and technology. After that ebusiness transformation cum maturity model is proposed, whose five levels acts as a benchmark to assess an organization at different maturity levels. Emphasis is not given on discussing maturity levels, but on the transformation stages that acts between any two levels of maturity. For this purpose, transformation matrix is proposed, which will guide organizations to take critical organizational and information technology ( IT ) domains into consideration during each transformation stage.
Download

Paper Nr: 84
Title:

SECURE TRANSPARENT MOBILITY - Secure Mobility Infrastructure using Mobile IP

Authors:

Mark Andrews, Ronan Skehill, Michael Barry and Sean Mc Grath

Abstract: Mobility has become an integral part of modern computing. It increases user flexibility by releasing the potential of fixed data. Reliance on a static computing platform is not sufficient for the future needs of nomadic users. Portable e-mail devices have become popular in recent years due to their simplicity and functionality. These devices give the average user transparent access to their e-mail from any location. Similar transparent access does not exist for general notebook or Personal Digital Assistant (PDA) computing environments. This paper addresses such access, and details a secure mobility architecture from which users can extract greater value. It utilises Mobile IP, IP Security, Internet Key Exchange and Firewalls to provide a comprehensive mobility solution. It evaluates a test-bed in which this secure mobility solution was deployed, and discusses the viability of a secure, transparent architecture which supports mobility.
Download

Paper Nr: 89
Title:

ADVERTISING VIA MOBILE TERMINALS - Delivering context sensitive and personalized advertising while guaranteeing privacy

Authors:

Rebecca Bulander, Michael Decker, Gunther Schiefer and Bernhard Kölmel

Abstract: Mobile terminals like cellular phones and PDAs are a promising target platform for mobile advertising: The devices are widely spread, are able to present interactive multimedia content and offer as almost permanently carried along personal communication devices a high degree of reachability. But particular because of the latter feature it is important to pay great attention to privacy aspects and avoidance of spam- messages when designing an application for mobile advertising. Furthermore the limited user interface of mobile devices is a special challenge. The following article describes the solution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.
Download

Paper Nr: 204
Title:

ON DIGITAL CASH-LIKE PAYMENT SYSTEMS

Authors:

Daniel Nagy

Abstract: In present paper a novel approach to on-line payment is presented that tackles some issues of digital cash that have, in the author’s opinion, contributed to the fact that despite the availability of the technology for more than a decade, it has not achieved even a fraction of the anticipated popularity. The basic assumptions and requirements for such a system are revisited, clear (economic) objectives are formulated and cryptographic techniques to achieve them are proposed.
Download

Paper Nr: 211
Title:

IN-DEPTH ANALYSIS OF SELECTED TOPICS RELATED TO THE QUALITY ASSESSMENT OF E-COMMERCE SYSTEMS

Authors:

Antonia Stefani, Dimitris Stavrinoudis and Michalis Xenos

Abstract: This paper provides an in-depth analysis of selected important topics related to the quality assessment of e-commerce systems. It briefly introduces to the reader a quality assessment model based on Bayesian Networks and presents in detail the practical application of this model, highlighting practical issues related to the involvement of human subjects, conflict resolution, and calibration of the measurement instruments. Furthermore, the paper presents the application process of the model for the quality assessment of various e- commerce systems; it also discusses in detail how particular features (data) of the assessed e-commerce systems can be identified and, using the described automated assessment process, lead to higher abstraction information (desiderata) regarding the quality of the assessed e-commerce systems.
Download

Paper Nr: 212
Title:

A NOVEL REAL-TIME SELF-SIMILAR TRAFFIC DETECTOR/FILTER TO IMPROVE THE RELIABILITY OF A TCP BASED END-TO-END CLIENT/SERVER INTERACTION PATH FOR SHORTER ROUNDTRIP TIME

Authors:

Wan W. Lin, Kang A. Wong, Richard, S. Wu and Tharam Dillon

Abstract: The self-similarity ( S 2 ) filter is proposed for real-time applications. It can be used independently or as an extra component for the enhanced RTPD (real-time traffic pattern detector) or E-RTPD. The S 2 filter basisisthe“asymptoticallysecond-orderself-similarity”concept (alternatively called statistical 2nd OSS or S2nd OSS) for stationary time series. The focus is the IAT (inter-arrival times) traffic. The filter is original because similar approaches are not found in the literature for detecting self-similar traffic patterns on the fly. Different experiments confirm that with help form the S 2 filter the FLC (Fuzzy Logic Controller) dynamic buffer size tuner control more accurately. As a result the FLC improves the reliability of the client/server interaction path leading to shorter roundtrip time (RTT).
Download

Paper Nr: 239
Title:

VIRTUAL CHARACTERISTICS MEASUREMENT USING FACTOR ANALYSIS

Authors:

Ghazal A. Milani, Koorush Ziarati and Alireza Tamaddoni-Nezhad

Abstract: Increasing development of using Information and Communication Technology and globalization issue leads to fundamental changes in classic principles of organizations. Hence, neglecting these changes can lead to the organizations failure. Substitution of virtual organization is one of the most important of these changes that many corporations claim. Of crucial necessity is the criterion for measuring the amount of their success in getting virtual characteristics. In this paper, we measure the degree of virtual characteristics by using the properties of an ideal virtual enterprise as a reference point and comparing each company with that point. To assess the degree of virtual characteristics, factor analysis method is used. Our aim in this paper is to perform an empirical research, besides improvement of previously used methods to measure the degree of virtual characteristics. The proposed method has been used to assess the degree of virtual characteristics of Iranian Petrochemical Corporations.
Download

Paper Nr: 241
Title:

STRATEGIES FOR SERVICE COMPOSITION IN P2P NETWORKS

Authors:

Jan Gerke, Peter Reichl and Burkhard Stiller

Abstract: Recently, the advance of service-oriented architectures and peer-to-peer networks has lead to the creation of service-oriented peer-to-peer networks, which enable a distributed and decentralized services market. Apart from the usage of single services, this market supports the merging of services into new services, a process called service composition. However, it is argued that for the time being this process can only be carried out by specialized peers, called service composers. This paper describes the new market created by these service composers, and models mathematically building blocks required for such a service composition. A general algorithm for service composition developed can be used independently of solutions for semantic difficulties and interface adaption problems of service composition. In a scenario for buying a distributed computing service, simulated strategies are evaluated according to their scalability and the market welfare they create.
Download

Paper Nr: 255
Title:

AN ORGANIZATION-BASED CACHE MECHANISM FOR SUPPORTING PCS NUMBER PORTABILITY SERVICE

Authors:

Ching-wen Cheng and Chyan-goei Chung

Abstract: The rapidly growth of PCS market promotes the number portability (NP) service becoming essential to enhancing fair competition among operators. However, the existed NP solutions face the same problems of huge NP database (NPDB), long delay time of portable number translation, and extra communication resource consumption. Although researches pointed to caches can be utilized to alleviate the workload of NPDB and to reduce NP call processing delay, it doesn’t fit for the mobile communication system. For large organizations, members move among the working space or the subsidiaries, many mobile calls are made between organization members. Furthermore, organizations usually have frequently contact targets, calls made from an organization often have locality. If caches are applied to organization-based mobile telecommunication components, the efficiency of NP service can be improved. In this paper, we propose an operation model of applying organization-based caches to the public mobile communication system. Besides, the time for NP call setup is investigated to state the feasibility and the effect of organization-based caches in the mobile communication system.
Download

Paper Nr: 256
Title:

THE ENGINE TO SUPPORT BUILDING CPC SOLUTIONS

Authors:

Jinmi Jung, Hyun Kim, Hyungsun Kim and Joohaeng Lee

Abstract: In modern business environment, inter-organizational collaborative product development is very important. CPC (Collaborative Product Commerce) is a new category of software, now emerging, to support inter-enterprise collaboration through the product life-cycle. But, so far there are not striking solutions to support collaboration among collaborative engineering groups. In this paper, we describe the engine to support building a CPC solution which is being developed by the Electronics and Telecommunications Research Institute (ETRI) as a part of a CPC project. It makes it possible to collaborate among geographically dispersed enterprises by sharing product information. We look over problems to have to be solved for designing the engine and propose solutions. In addition, we mention the developed CPC solution using the engine.
Download

Paper Nr: 256
Title:

THE ENGINE TO SUPPORT BUILDING CPC SOLUTIONS

Authors:

Jinmi Jung, Hyun Kim, Hyungsun Kim and Joohaeng Lee

Abstract: In modern business environment, inter-organizational collaborative product development is very important. CPC (Collaborative Product Commerce) is a new category of software, now emerging, to support inter-enterprise collaboration through the product life-cycle. But, so far there are not striking solutions to support collaboration among collaborative engineering groups. In this paper, we describe the engine to support building a CPC solution which is being developed by the Electronics and Telecommunications Research Institute (ETRI) as a part of a CPC project. It makes it possible to collaborate among geographically dispersed enterprises by sharing product information. We look over problems to have to be solved for designing the engine and propose solutions. In addition, we mention the developed CPC solution using the engine.
Download

Paper Nr: 260
Title:

A HIERARCHICAL DISTRIBUTED COMMUNICATION ARCHITECTURE FOR REAL-TIME AUCTIONS

Authors:

Ilhem A. Abdelmoula, Hella Ben Ayed Kaffel and Farouk Kamoun

Abstract: This paper presents a new hierarchical distributed communication architecture, called AHS (Auction Handling System), based on clusters. This architecture uses the IRC (Internet Relay Chat) channels and protocol facilities in order to support real-time auction applications (RTA). Coordination between distributed auction servers is needed to exchange and update some relevant auction information and to resolve the winning bid within a cluster. The problem is how to determine the best location of the auction server coordinator. For this purpose, we suggest the use of the Floyd-Warshall’s algorithm, which is a graph theory algorithm.
Download

Paper Nr: 270
Title:

TRANSMISSION OF A MESSAGE DURING LIMITED TIME WITH THE HELP OF TRANSPORT CODING

Authors:

Evgenii Krouk and Sergei Semenov

Abstract: A fundamental characteristic of the majority of communications networks is the mean message delay. In a packet-switching network, the mean packet and message delay may differ considerably from each other, and their distribution will often take different forms. The mean message delay depends both on the mean packet delay and on the dispersion of the packet delay. Obviously, by reducing the mean packet delay one can also reduce the message delay. However, it is not always possible to decrease the mean packet delay in the network. A proposed method of transmitting data in a network is based on the use of error-correcting coding, which reduces the dispersion of the packet delay with some increase in the mean packet delay. The conditions were obtained for which an increase in the mean packet delay with simultaneous reduction in the dispersion leads to a reduction in the mean message delay. In many real time networks there are exist some restrictions on the message delay. Use of the transport coding makes it possible to deliver the messages over the network during some limited time with high probability.
Download

Paper Nr: 280
Title:

SECURING XML WEB SERVICES – A PLUG & PLAY APPROACH

Authors:

Cristian Donciulescu and Luminita Vasiu

Abstract: XML Web Services have the potential of becoming the underlying technology on which the future of the Internet is built. However, several hurdles stand in the way before that can happen. Security issues, for one, are slowing down the rate at which industry adopts the use of Web Services and in spite of the coordinated efforts made to correct those problems, the actual results can be years away. This paper is aimed at providing a more immediate solution for Web Services in the form of an architectural design, not only regarding security aspects, but rather enabling a wider range of e-commerce supporting features which are of utmost importance for a wide acceptance of this technology within the industry.
Download

Short Papers
Paper Nr: 4
Title:

Wireless Local Loop for a Developing Country

Authors:

Anwar Sadat

Abstract: In many developing countries, there is tremendous demand for new business and residential telephone service. More and more operators are looking to wireless technologies to rapidly provide thousands of new subscribers with high-quality telephone service at a reasonable price. Wireless Local Loop (WLL) technology, which has rapidly advanced over the few years, can enable rapid expansion of telecom and Internet access in developing countries. The design of a WLL system requires one to understand some fundamentals concerning the access network and its connectivity to backbone network. The requirements of WLL contrasted to that of a Mobile cellular system need to be clearly understood. The concern for capacity and spectral efficiency is equally important. This paper tries to looks at these fundamental issues. A study of a developing country, has been made looking at the present WLL installations and future opportunities in this area.

Paper Nr: 232
Title:

AN IMPROVED GENETIC ALGORITHM FOR SOLVING THE VEHICLE ROUTING PROBLEM WITH TIME WINDOWS

Authors:

Li Taoshen and Wu Jingli

Abstract: Many practical transport logistics and distribution problems can be formulated as the vehicle routing problem with time windows (VRPTM). The objective is to design an optimal set of routes that services all customers and satisfies the given constraints, especially the time window constraints. The complexity of the VRPTW requires heuristic solution strategies for most real-life instances. However, the VRPTM is a combination optimization problem and is a NP-complete problem, so we can’t get satisfying results when we use exact approaches and normal heuristic ones. In this paper, an improved genetic algorithm to solve the VRPTM problem is developed, which use an improved Route Crossover operator (RC’) and can meet the needs for solving VRPTM problem. Computational experiments show that the GA based on RC’ can obtain a general optimality for all evaluated indexes on the premise of satisfying every customer’s demand and its performance is superior to the GA based on PMX or RC.
Download

Paper Nr: 249
Title:

END TO END ADAPTATION FOR THE WEB - Matching Content to Client Connections

Authors:

Kristoffer Getchell, Martin Bateman, Colin Allison and Alan Miller

Abstract: The size and heterogeneity of the Internet means that the bandwidth available for a particular download may range from many megabits per second to a few kilobits. Yet Web Servers today provide a one size fits all service and consequently the delay experienced by users accessing the same Web Page may range from a few milliseconds to minutes. This paper presents a framework for making Web Servers aware of the Quality of Service that is likely to be available for a user session, by utilising measurements of past traffic conditions. The Web Server adapts the fidelity of content delivered to users in order to control the delay experienced and thereby optimise the browsing experience. Where high bandwidth connectivity and low congestion exist high fidelity content will be delivered, where the connectivity is low bandwidth, or the path congested, lower fidelity content will be served, and delay controlled.
Download

Paper Nr: 254
Title:

A PBX-BASED APPROACH FOR TELECOMMUNICATION NUMBER PORTABILITY SERVICE

Authors:

Ching-wen Cheng and Chyan-goei Chung

Abstract: Number portability (NP) service has become an important factor in enhancing the competitiveness of a service provider. Although NP service is available now, NP database (NPDB) query and portable number translation are all-call-based, and the time required to process a NP call is long. It is an overhead to the operator and the user. How to reduce the impact of NP call process is an important issue. Considering an organization often has dialled number locality, we suggest applying caches to PBX to keep the routing information of portable numbers. In this paper, the interoperation of PBX and operator network is introduced. We also demonstrate the workload of portable number translation is shared out to PBX, the delay time of querying routing information is shorten, and the efficiency of NP call process is enhanced.
Download

Paper Nr: 254
Title:

A PBX-BASED APPROACH FOR TELECOMMUNICATION NUMBER PORTABILITY SERVICE

Authors:

Ching-wen Cheng and Chyan-goei Chung

Abstract: Number portability (NP) service has become an important factor in enhancing the competitiveness of a service provider. Although NP service is available now, NP database (NPDB) query and portable number translation are all-call-based, and the time required to process a NP call is long. It is an overhead to the operator and the user. How to reduce the impact of NP call process is an important issue. Considering an organization often has dialled number locality, we suggest applying caches to PBX to keep the routing information of portable numbers. In this paper, the interoperation of PBX and operator network is introduced. We also demonstrate the workload of portable number translation is shared out to PBX, the delay time of querying routing information is shorten, and the efficiency of NP call process is enhanced.
Download

Paper Nr: 290
Title:

E-BUSINESS FOR THE ELECTRICITY RETAIL MARKET - A Business to Client perspective

Authors:

Victor D. Santos, Edmundo Monteiro and António Martins

Abstract: In the new deregulated market of the electricity industry the communication and e-Business infrastructure plays a main role for the efficiency of all the entities present in the electricity sector. From generation to the final client there are two markets, the wholesale and the retail market. Specific characteristics of the electricity industry make the communication support a fundamental tool to reflect the changes made by one of the intervenients in the whole value chain. When prices change at the wholesale market it is necessary to reflect them at the final consumers. Without a bidirectional and reliable communication systems several problems could occur, from spikes in the electricity prices that could take retail companies to bankruptcy, to huge blackouts that happened in Europe and in the United States. The goal of this paper is to present a model for the electricity retail market. Several studies have been done about the electricity markets, the grand majority focus their attention on the wholesale market. Our proposal is to analyse the e-Business communication structure in a Business-to-Client perspective.
Download

Paper Nr: 16
Title:

ENHANCED DISCOVERY OF WEB SERVICES - Using Semantic Context Descriptions

Authors:

Simone Ludwig and Sms Reyhani

Abstract: Automatic discovery of services is a crucial task for the e-Science and e-Business communities. Finding a suitable way to address this issue has become one of the key points to convert the Web into a distributed source of computation, as they enable the location of distributed services to perform a required functionality. To provide such an automatic location, the discovery process should be based on a semantic match between a declarative description of a service being sought and a description being offered. This problem requires not only an algorithm to match these descriptions, but also a language to declaratively express the capabilities of services. This paper presents a context-aware ontology selection framework which allows an increase in precision of the retrieved results by taking contextual information into account.
Download

Paper Nr: 27
Title:

COST-EFFECTIVE SERVICE TASK ASSIGNMENT IN MULTI- DOMAIN DISTRIBUTED COMPUTING ENVIRONMENTS

Authors:

Malamati Louta, Angelos Michalas, Ioannis Psoroulas and Evangelos Loutas

Abstract: Highly competitive and open environments should encompass mechanisms that will assist service providers in accounting for their interests, i.e., offering at a given period of time adequate quality services in a cost efficient manner which is highly associated to efficiently managing and fulfilling current user requests. In this paper, service task assignment problem is addressed from one of the possible theoretical perspectives, while new functionality is introduced in service architectures that run in open environments in order to support the proposed solution. The pertinent problem aiming to find the most appropriate assignment of service tasks to service nodes is concisely defined, mathematically formulated and empirically evaluated.
Download

Paper Nr: 27
Title:

COST-EFFECTIVE SERVICE TASK ASSIGNMENT IN MULTI- DOMAIN DISTRIBUTED COMPUTING ENVIRONMENTS

Authors:

Malamati Louta, Angelos Michalas, Ioannis Psoroulas and Evangelos Loutas

Abstract: Highly competitive and open environments should encompass mechanisms that will assist service providers in accounting for their interests, i.e., offering at a given period of time adequate quality services in a cost efficient manner which is highly associated to efficiently managing and fulfilling current user requests. In this paper, service task assignment problem is addressed from one of the possible theoretical perspectives, while new functionality is introduced in service architectures that run in open environments in order to support the proposed solution. The pertinent problem aiming to find the most appropriate assignment of service tasks to service nodes is concisely defined, mathematically formulated and empirically evaluated.
Download

Paper Nr: 43
Title:

E-COMMERCE TICKETING TOOL FOR MULTIFUNCTIONAL ENCLOSURES - Low cost solutions for tradicional venues best adventaje

Authors:

Ricardo Colomo, Angel Garcia-crespo and Edmundo Tovar

Abstract: The explosion of Internet has made consumers much more familiar with new ways to shop. Sellers can distribute their products and accept orders from buyers 24 hours a day. The field of e-Ticketing constitutes one of the mightier lines of business in e-commerce. Traditional enclosures, like bullrings, have a vital importance in the circuits of leisure of many places of Europe, but they count on the disadvantage of the obsolescence in its systems and procedures. This paper describes the initiative carried out in Spain, which allows the companies that manage traditional enclosures to sell tickets through the Internet without making big payments in order to reach new channels and to improve the operation and yield of the present ones.
Download

Paper Nr: 70
Title:

LATS Software Platform for Development of Telecommunication Network Design Tools

Authors:

Zdenko Vrdoljak, Mladen Kos and Marije Ljolje

Abstract: The number of network dimensioning problems increases with emergence of new networking technologies. Due to the complexity of the problems, the use of software-based network design tools is necessary. However, every new problem introduces new set of parameters needed to define the problem and new algorithms to solve it. Creation of new software tools is therefore imminent. However, each tool has to deal with graphics, the tools for network definition, the way to define the problem in a file, the way to organize the problem's solver etc. For each of those demands a whole industry of different programmers spending time on building the new tool for the new problem. The greatest majority of the programmers is unfamilar with the problem, or how to solve it efficiently. Even worst, more than 80% of the time is spent on developing graphic user interface that can usually be used on a single operating system. In this paper we describe a software platform under development that allows easy development of new network tools by simply configuring graphic user interface to match the tool's requirements and to concentrate on writing the algorithms in any language suitable for the algorithm's creator. This way the tool development time is significantly reduced allowing quick responses to emergrence of new network design and analysis problems.

Paper Nr: 75
Title:

A FRAMEWORK FOR POLICY-BASED SLA MANAGEMENT OVER WIRELESS LAN

Authors:

Noh-sam Park and Gilhaeng Lee

Abstract: With the evolution of wireless networks, the wireless community has been increasingly looking for a framework that can provide policy-based SLA management. In this paper we first construct such a framework and then describe how SLA-based control can be used to achieve QoS in wireless environment. We provide a common generic framework capable of components to interwork via XML. The proposed framework offers effective WLAN QoS control and management using client-side agent.
Download

Paper Nr: 75
Title:

A FRAMEWORK FOR POLICY-BASED SLA MANAGEMENT OVER WIRELESS LAN

Authors:

Noh-sam Park and Gilhaeng Lee

Abstract: With the evolution of wireless networks, the wireless community has been increasingly looking for a framework that can provide policy-based SLA management. In this paper we first construct such a framework and then describe how SLA-based control can be used to achieve QoS in wireless environment. We provide a common generic framework capable of components to interwork via XML. The proposed framework offers effective WLAN QoS control and management using client-side agent.
Download

Paper Nr: 77
Title:

Multi-ring network design tool

Authors:

Matija Mikac, Domagoj Mikac and Mladen Kos

Abstract: A need for specialized network optimization and design tools is always a hot topic among network professionals. Technology is changing rapidly, and to stay in business corporations must relay on network planning tools capable of complex calculations, estimations and multiple scenario situations. Today telecommunication networks have very complex structure due to simultaneous deployment of different network technologies. Classical layered network architecture is not applicable in realistic scenarios that are common today. On the other side, network design tools are often either generic, meaning that calculation do not take into account real network equipment and its capability; or technology specific, meaning that network design tool performs calculation for specific technology (SDH, Ethernet, GSM etc.). In this paper a ring based network design tool will be described. The tool supports semi-automatic design of SDH ring based network with Ethernet over SDH capability.

Paper Nr: 79
Title:

WEB PERSONALIZED INTELLIGENT USER INTERFACES AND PROCESSES - An Enabler of Multi-Channel eBusiness Services Sustainability

Authors:

Panagiotis Germanakos, Constantinos Mourlas and Chara Isaia

Abstract: The explosive growth in the size and use of the World Wide Web as a communication medium has been enthusiastically adopted by the mass market to provide an electronic connection between progressive businesses and millions of customers bringing to light the eBusiness sector. However, the nature of most Web structures is static and complicated, and users often lose sight of the goal of their inquiry. Hence, practitioners need to alleviate any navigational difficulties and satisfy the heterogeneous needs of the users to allow web applications of this nature to survive. Main emphasis is given at saving costs, improving efficiency and growth, competitiveness, expanding markets, create new infrastructures to support B2B and B2C Web activities and creating more business opportunities, for local and regional governments. This paper presents the research implications and challenges of the Web Personalization concept as an enabler of eBusiness Services sustainability with the development of Personalized Intelligent User Interfaces and processes.
Download

Paper Nr: 79
Title:

WEB PERSONALIZED INTELLIGENT USER INTERFACES AND PROCESSES - An Enabler of Multi-Channel eBusiness Services Sustainability

Authors:

Panagiotis Germanakos, Constantinos Mourlas and Chara Isaia

Abstract: The explosive growth in the size and use of the World Wide Web as a communication medium has been enthusiastically adopted by the mass market to provide an electronic connection between progressive businesses and millions of customers bringing to light the eBusiness sector. However, the nature of most Web structures is static and complicated, and users often lose sight of the goal of their inquiry. Hence, practitioners need to alleviate any navigational difficulties and satisfy the heterogeneous needs of the users to allow web applications of this nature to survive. Main emphasis is given at saving costs, improving efficiency and growth, competitiveness, expanding markets, create new infrastructures to support B2B and B2C Web activities and creating more business opportunities, for local and regional governments. This paper presents the research implications and challenges of the Web Personalization concept as an enabler of eBusiness Services sustainability with the development of Personalized Intelligent User Interfaces and processes.
Download

Paper Nr: 199
Title:

NEW TRENDS OF E-COMMERCE IN SPAIN

Authors:

Israel Gonzalez-carrasco, Jose Luis Lopez-cuadrado, Belen Ruiz-Mezcua and Angel Garcia-crespo

Abstract: eCommerce can be defined, in an ample sense, as any form of commercial transaction based on the remote data transmission on communication networks. In order to facilitate this process, the market at the moment offers an ample range of electronic payment systems that allow to make electronic purchases with simplicity and transparency, being helped to harness the sales and to manage them of efficient way. This article presents, in the first place, the current situation of the electronic commerce in Spain, detailing the state of the used technology, its real possibilities of use, the new methods of payment, the security used in the process and the influence that it has in the market. Secondly, is a proposal of virtual store in which different technologies are integrated to make the process of purchase software product. The designed website innovates in the implemented modality of payment, considers the effective legislation at the present time in Spain, and it makes agile and assures the process purchase with the activation of each product in an individual way.
Download

Paper Nr: 224
Title:

NEDINE: AN INTELLIGENT GLOBAL NEWS PUBLISHING AND DISTRIBUTION SERVICE BASED ON WEB SERVICES AND PEER-TO-PEER TECHNOLOGIES

Authors:

Markus Schranz

Abstract: Modern Internet technologies have been opening innovative aspects in research for more than two decades and entrepreneurs and pioneers have been transferring latest technical developments to successful businesses. Business oriented application domains like media get increasingly interested in applying such modern technologies. The specific application domain news publishing and news distribution is facing significant performance requirements and high loads of information handling while transferring hundreds of thousands of messages daily to the research and commercial auditorium. Although communication technologies are well employed by modern organizations to generate, publish and distribute their information, specific application domains like online news publishing and distribution involve multinational and multilingual requirements and enormous amounts of data to be transported. This paper discusses an approach that integrates news agency services from existing European organizations supported by University research in the are of global information services, distributed information management and AI in order to form an intelligent multinational business news publishing and distribution network, based on Web Services and a peer-to-peer inter-agency communication network.
Download

Paper Nr: 285
Title:

GMPLS IMPACT ON NETWORK PROVIDER’S OPEX WHEN COMPARED TO TRADITIONAL APPROACHES

Authors:

Sandrine Pasqualini, S. Verbrugge, Andreas Kirstädter, Andreas Iselt, D. Colle, Mario Pickavet and P. Demeester

Abstract: This paper provides a detailed analysis and modelling of the Operational Expenditures (OPEX) for a network provider. The traditional operational processes are elaborated and the expected changes when using GMPLS are described. GMPLS is promoted as a major technology for the automation of network operations. It is often claimed to allow the reduction of OPEX. However, detailed analysis and quantitative evaluation of the changes induced by such technologies is rare. In this paper we quantify the cost reduction potential of GMPLS. In case of a traditional network, we show an important impact of the used resilience scheme on the expenses directly related to continuous costs of infrastructure (floorspace, energy,…) and on the planning and reparation costs. Concerning the service provisioning costs, we show that GMPLS
Download

Area 2 - Security and Reliability in Informations Systems and Networks

Full Papers
Paper Nr: 13
Title:

BIOMETRIC BASED SMART CARD FOR SECURITY

Authors:

Chunlei Yang, Gui Yun Tian and Steve Ward

Abstract: Fingerprint has been increasingly used in authentication applications. Smart card is becoming more and more common and is moving toward a multi-function era. The integration of biometric and smart card is a trend for the future of smart card. As a part of our research project which concerns a novel security card, we propose to integrate the fingerprint sensor with the smart card instead of the normal solution where the sensor is installed with a terminal machine. This solution has some advantages regarding security, user privacy as well as flexibility. In this paper, we study the biometric security and outline our solution. In addition, in the system authentication decision part, a novel adaptive decision algorithm which combined with biometrics, PIN (personal identify number) is introduced. This algorithm can be a better trade-off between user convenience and security.
Download

Paper Nr: 33
Title:

SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION

Authors:

Seny Kamara, Breno De Medeiros and Susanne Wetzel

Abstract: Biometrics play an increasingly important role in the context of access control techniques as they promise to overcome the problems of forgotten passwords or passwords that can be guessed easily. In this paper we introduce and provide a formal definition of the notion of secret locking which generalizes a previously introduced concept for cryptographic key extraction from biometrics. We give details on an optimized implementation of the scheme which show that its performance allows the system for use in practice. In addition, we introduce an extended framework to analyze the security of the scheme.
Download

Paper Nr: 71
Title:

HOST IDENTITY PROTOCOL PROXY

Authors:

Patrik Salmela and Jan Melén

Abstract: The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.
Download

Paper Nr: 88
Title:

ADAPTIVE REAL-TIME NETWORK MONITORING SYSTEM - Detecting Anomalous Activity with Evolving Connectionist System

Authors:

Muhammad F. Pasha, Rahmat Budiarto and Masashi Yamada

Abstract: When diagnosing network problems, it is desirable to have a view of the traffic inside the network. This can be achieved by profiling the traffic. A fully profiled traffic can contain significant information of the network’s current state, and can be further used to detect anomalous traffic and manage the network better. Many has addressed problems of profiling network traffic, but unfortunately there are no specific profiles could lasts forever for one particular network, since network traffic characteristic always changes over and over based on the sum of nodes, software that being used, type of access, etc. This paper introduces an online adaptive system using Evolving Connectionist Systems to profile network traffic in continuous manner while at the same time try to detect anomalous activity inside the network in real-time and adapt with changes if necessary. Different from an offline approach, which usually profile network traffic using previously captured data for a certain period of time, an online and adaptive approach can use a shorter period of data capturing and evolve its profile if the characteristic of the network traffic has changed.
Download

Paper Nr: 88
Title:

ADAPTIVE REAL-TIME NETWORK MONITORING SYSTEM - Detecting Anomalous Activity with Evolving Connectionist System

Authors:

Muhammad F. Pasha, Rahmat Budiarto and Masashi Yamada

Abstract: When diagnosing network problems, it is desirable to have a view of the traffic inside the network. This can be achieved by profiling the traffic. A fully profiled traffic can contain significant information of the network’s current state, and can be further used to detect anomalous traffic and manage the network better. Many has addressed problems of profiling network traffic, but unfortunately there are no specific profiles could lasts forever for one particular network, since network traffic characteristic always changes over and over based on the sum of nodes, software that being used, type of access, etc. This paper introduces an online adaptive system using Evolving Connectionist Systems to profile network traffic in continuous manner while at the same time try to detect anomalous activity inside the network in real-time and adapt with changes if necessary. Different from an offline approach, which usually profile network traffic using previously captured data for a certain period of time, an online and adaptive approach can use a shorter period of data capturing and evolve its profile if the characteristic of the network traffic has changed.
Download

Paper Nr: 206
Title:

CELLULAR AUTOMATA BASED KEY AGREEMENT

Authors:

Debdeep Mukhopadhyay and Dipanwita Roychowdhury

Abstract: This paper proposes a new key agreement protocol using Cellular Automata (CA). The primitives on which the protocol is based has been developed using specially designed CA structures. The paper aims at developing a key agreement technique which is not based on the Diffie-Hellman problem. The removal of exponentiations makes the protocol fast and have a linear time complexity. The protocol has been found to resist known forms of attacks. Indeed the initial review promises the development of a key agreement protocol which meets nicely the conflicting ends of security and efficiency.
Download

Paper Nr: 206
Title:

CELLULAR AUTOMATA BASED KEY AGREEMENT

Authors:

Debdeep Mukhopadhyay and Dipanwita Roychowdhury

Abstract: This paper proposes a new key agreement protocol using Cellular Automata (CA). The primitives on which the protocol is based has been developed using specially designed CA structures. The paper aims at developing a key agreement technique which is not based on the Diffie-Hellman problem. The removal of exponentiations makes the protocol fast and have a linear time complexity. The protocol has been found to resist known forms of attacks. Indeed the initial review promises the development of a key agreement protocol which meets nicely the conflicting ends of security and efficiency.
Download

Paper Nr: 223
Title:

OPTIMAL TRADE-OFF FOR MERKLE TREE TRAVERSAL

Authors:

Marek Karpinski and Yakov Nekrich

Abstract: In this paper we describe optimal trade-offs between time and space complexity of Merkle tree traversals with their associated authentication paths, improving on the previous results of Jakobsson, Leighton, Micali, and Szydlo (Jakobsson et al., 03) and Szydlo (Szydlo, 04). In particular, we show that our algorithm requires 2 log n/ log(3) n hash function computations and storage for less than (log n/ log(3) n + 1) log log n + 2 log n hash values, where n is the number of leaves in the Merkle tree. We also prove that these trade-offs are optimal, i.e. there is no algorithm that requires less than O(log n/ log t) time and less than O(t log n/ log t) space for any choice of parameter t ≥ 2. Our algorithm could be of special use in the case when both time and space are limited.
Download

Paper Nr: 230
Title:

SUPPΟRTING THE CYBERCRIME INVESTIGATION PROCESS: EFFECTIVE DISCRIMINATION OF SOURCE CODE AUTHORS BASED ON BYTE-LEVEL INFORMATION

Authors:

Georgia Frantzeskou, Efstathios Stamatatos and Stefanos Gritzalis

Abstract: Source code authorship analysis is the particular field that attempts to identify the author of a computer program by treating each program as a linguistically analyzable entity. This is usually based on other undisputed program samples from the same author. There are several cases where the application of such a method could be of a major benefit, such as tracing the source of code left in the system after a cyber attack, authorship disputes, proof of authorship in court, etc. In this paper, we present our approach which is based on byte-level n-gram profiles and is an extension of a method that has been successfully applied to natural language text authorship attribution. We propose a simplified profile and a new similarity measure which is less complicated than the algorithm followed in text authorship attribution and it seems more suitable for source code identification since is better able to deal with very small training sets. Experiments were performed on two different data sets, one with programs written in C++ and the second with programs written in Java. Unlike the traditional language-dependent metrics used by previous studies, our approach can be applied to any programming language with no additional cost. The presented accuracy rates are much better than the best reported results for the same data sets.
Download

Paper Nr: 238
Title:

A SIGNALING ARCHITECTURE AGAINST DOS ATTACKS

Authors:

Ahmad Fadlallah and Ahmed Serhrouchni

Abstract: Denial of service (DoS) attacks figure highly among the dangers that face the Internet. Many research studies deal with DoS, proposing models and/or architectures to stop this threat. The proposed solutions vary between prevention, detection, filtering and traceback of the attack. The latter (attack traceback) constitutes an important part of the DoS defense. The most complex issue it has to face is related to the fact that attackers often used spoofed or incorrect IP addresses, thus disguising the true origin. In this work, we propose a signaling architecture and a security-oriented signaling protocol named 3SP (Simple Security Signaling Protocol). This solution makes it easier to trace both the DoS and other types of attack back to their sources; it is simple, robust and efficient against IP spoofing, and thus constitutes a novel and efficient approach to deal with the attack traceback problem.
Download

Paper Nr: 261
Title:

SURVEY ON SNMP IN NEXT GENARATION NETWORK

Authors:

Yan Liu, Yin Xia and Jianping Wu

Abstract: Network management is a process to control networks with great efficiency. So far, network management protocols have changed from SNMPv1, SNMPv2 to SNMPv3. This paper briefly compares and analyses these versions on SMI & MIB, protocol operation, security and access control. Besides, it thoroughly summarizes most research aspects of recent SNMP developments, especially the next generation network and new technologies. It also analyses and points out the most promising aspects.
Download

Paper Nr: 284
Title:

RELIABILITY EVALUATION OF WDM NETWORKS WITH LINK CAPACITY AND HOP CONSTRAINTS

Authors:

Hehong Fan, Mingde Zhang and Xiaohan Sun

Abstract: A reliability evaluation module is presented for study of WDM network reliability. In this module, WDM networks are assumed to consist of three kinds of network elements - nodes, links and wavelength channel-related elements. And a network performance index – network ‘function value’, was introduced here as a quantitative representation of working-state of WDM network under certain link capacity and hop requirements. In addition, WDM networks here are assumed to be a survivable network, which can operate in a degradative manner against destruction and thus have multiple working-states instead of two opposite states. The reliability evaluation module was used to analyse the reliability of a WDM network with CERNET topology. Simulation results indicate that different link capacity requirement as well as different working-state requirements may lead to different reliability evaluation results, and the differences will enlarge very quickly with the increasing of network element failure rates. This implies that the study of WDM network reliability should be performed under multiple working-states assumption and the addition of the new network element kind - a wavelength channel-related element is necessary.
Download

Paper Nr: 293
Title:

ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION SYSTEM

Authors:

Rachid Bencheikh and Luminita Vasiu

Abstract: Mobile devices and wireless technologies seem destined to make a large and continuing impact on our lives. Mobile devices especially have been widely used in the last few years, and recent developments in wireless technologies have provided some new solutions to connectivity problems. Wireless technologies provide a new channel for implementation of mobile payments systems, the potential of short-range wireless technologies in commercial markets is enormous. Furthermore, as the popularity of m-commerce increases, so does the need for protecting personal privacy and online data. Several user authentication schemes for mobile e-commerce are starting to be introduced. This paper discusses some single factor and hybrid authentication methods currently in use, or being planned, for e-commerce and m-commerce. It also suggests a hybrid three-factor authentication scheme for mobile commerce, especially for voice-based mobile commerce, that uses speech recognition and speaker verification technology. Some issues relevant to such a scheme are also discussed.
Download

Short Papers
Paper Nr: 10
Title:

VOICE BIOMETRICS WITHIN THE FAMILY: TRUST, PRIVACY AND PERSONALISATION

Authors:

Delphine Charlet and Victor Peral Lecha

Abstract: Driven by an increasing need for personalising and protecting access to voice services, the France Telecom R&D speaker recognition system has been used as a framework for experimenting with voices in a family context. With the aim of evaluating this task, 33 families were recruited. Particular attention was given to 2 main scenarios: a name-based and a common sentence-based scenario. In each case, members of the family pronounce their complete name or a common sentence respectively. Moreover, this paper presents a database collection and first experiments for family voices. The results of this preliminary study show the particular difficulties of speaker recognition within the family, depending on the scenario, the genre and age of the speaker, and the physiological nature of the impersonation.
Download

Paper Nr: 35
Title:

A REUSABLE INTELLIGENT AUTHORIZATION DESIGN FOR WEB SERVICES SOFTWARE SECURITY

Authors:

Weider Yu and Archana Mansukhani

Abstract: Web services are a new way of thinking in distributed computing. They are an important step towards service-oriented architecture (SOA). Web services are used to obtain service in an open, platform independent way. Recent focus on web services has been in the area of security, which is an ongoing concern in many areas and is very pertinent to web services technology. This paper describes the design of a reusable authorization layer for web services software. This layer resides separate from the web services themselves and uses a rule based inference engine for determining authorization and access rights. It also uses different types of access control to formulate feature-rich rules.
Download

Paper Nr: 82
Title:

AUTOMATED CONFIGURATION DISTRIBUTION IN VERINEC

Authors:

David Buchmann, Dominik Jungo and Ulrich Ultes-Nitsche

Abstract: We present in this paper a system to configure networks. The Verified Network Configuration (Verinec) project aims to manage the complete network from one central XML database. This approach allows to test whether the configuration is usable prior to modify the setup of the real network devices. The distribution of the configuration is handled by the adaption module, a framework which can be extended to support all kinds of services and devices. Applying the configuration to each managed device within the network requires conversion from the Verinec XML database into a format suitable for that device and send the configuration to the device using a protocol supported by that device. In this paper, we focus on the adaption module.
Download

Paper Nr: 86
Title:

ESTIMATION OF THE DISTRIBUTIONS OF THE QOS PARAMETERS USING SAMPLED PASSIVE MEASUREMENTS TECHNIQUES

Authors:

Yazeed Al-sbou, Reza Saatchi, Samir Al-Khayatta and Rebecca Strachan

Abstract: As networks grow in complexity and scale, the importance of network performance monitoring and measurement also increases significantly. High data rates often lead to large amount of measurement results. Therefore, in order to prevent an exhaustion of the network resources and to reduce the measurement cost, a reduction of the collected data is required. A performance measurement method for estimating the actual network performance, experienced by the user, has been proposed. This study focuses on monitoring the network performance and estimates its main Quality of Service (QoS) parameters (delay, throughput, and jitter) through the use of a non-intrusive passive measurement method based on sampling methodologies. This method will overcome the drawbacks of both active and passive monitoring methods. That is because it measures the actual performance experienced by the user and requires reduced calculations of QoS parameters from the sampled packets. The validation of this approach was analysed and verified through simulations. Three different sampling techniques (systematic, random, and stratified) were investigated. The study indicated that an accurate estimation of the QoS parameters could be obtained without the need to measure across the whole packets of traffic information. As a result, the scheme has shown an estimation of the detailed characteristics of performance for each user. For a bottleneck based network topology and traffic conditions used, the random sampling showed the best overall performance.
Download

Paper Nr: 210
Title:

RELIABLE MULTICAST PROTOCOL - A modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocols

Authors:

Chih-shih Tau and Tzone-i Wang

Abstract: This paper proposes a modified retransmission-based loss-recovery mechanism based on the selective repeated ARQ protocols for reliable multicast delivery. With the operation of XOR, it minimizes the number of packets for retransmissions, reduces the network burden, and increases the throughput. Furthermore, the analysis infers a basis for choosing the suitable loss-packed size of retransmission to achieve higher throughput with lower network cost. The delays of processing time are also evaluated as well. Some interested effects of key system parameters on the delay performance are observed.
Download

Paper Nr: 220
Title:

THE WEB-BASED SLA MONITORING AND REPORTING (WSMR) SYSTEM

Authors:

Eunjin Ko, Junwoo Lee, Gilhaeng Lee and Youngsun Kim

Abstract: To provide high-level quality of network service and prevent contract dissension, a Service Level Agreement (SLA) is an essential key factor in telecommunication industry. While most network service providers normally offer an SLA communicating with legacy monitoring or reporting systems, it is needed to suggest new architecture of an SLA system for accommodating legacy network management systems without considering operating environment of each system. To guarantee level of network service, it is important to gather raw data from legacy systems or other Operating Support Systems and exactly manage it in time. In this paper, we suggest architecture of an integrated SLA system that is operated on the web-based communicating technology with legacy systems, i.e. Web-based Service Level Agreement Monitoring and Reporting (WSMR) system. The proposed architecture offers the way to gather raw data and process it using web-based communicating technology.
Download

Paper Nr: 251
Title:

MONITORING AND ALARM MANAGEMENT FOR SYSTEM AND NETWORK SECURITY - A web-based comprehensive approach

Authors:

João Afonso, Edmundo Monteiro and Carlos Ferreira

Abstract: In this work we propose a computer platform that aims to unify the tasks of monitoring, diagnosing, error detection, alarm management and intrusion detection associated with the administration of a computer network and related critical services. As main objective, we intend to develop a user-intuitive program that does not require specialized computer skills from the operators in order to assume full responsibility for the system. Open-source solutions were used, whenever possible, namely for server operating systems, application development tools, database engine and integrated Web solution. The project started by studying the existing solutions, exploring their strengths and shortcomings and iteratively defining the specific requirements to be implemented. The development phase was conceptually divided in three different levels: the agents and connectors collecting the data from the different areas being monitored; the database engine, cataloguing the information and the Web Interface (Security Portal) that allows the management of all functionalities and guarantees the operationability of the solution. An alarm management tool should also be developed permitting, according to programmed warnings for certain malfunctions, trigger the warning messages through the pre-defined medium – E-Mail, SMS (short message service) or IM (instant messaging), using a Unified Messaging (UM) solution. According to the defined specifications, the solution to be implemented was designed and a functional analysis was created. Finally the projected solution was implemented and applied to a case study – the Department of Fisheries Inspection from the General-Directorate of Fisheries and Aquiculture. The preliminary results from the reliability and user- friendliness tests were very positive and a decision was made to move into the production phase. The platform was developed in line with current accessibility requirements and can be operated / consulted by users with disabilities.
Download

Paper Nr: 253
Title:

CLUSTER AND NETWORK MANAGEMENT INTEGRATION - An SNMP-based Solution

Authors:

Rodrigo Alves, Clarissa C. Marquezan, Philippe Navaux and Lisandro Granville

Abstract: The management of high-performance clusters, in several situations, needs to be integrated with the management of computer networks. In order to achieve such integration, a network management architecture and protocol, such as the SNMP, could be used for cluster management. This paper investigates the required integration through the implementation of SNMP agents deployed in the cluster infrastructures, as well as the development of a management system for these SNMP agents.
Download

Paper Nr: 268
Title:

DESIGN ISSUES FOR ELECTRONIC AUCTIONS

Authors:

Jarrod Trevathan, Wayne Read and Hossein Ghodosi

Abstract: Extensive research has been conducted in order to improve the security and efficiency of electronic auctions. However, little attention has been paid to the design issues. This paper discusses design issues and contrasts the differing security requirements between various auction types. We demonstrate that poor design for an electronic auction breaches the security of the system and degrades its practicality, irrespective of how secure/efficient the building blocks of an electronic auction are. This is accomplished by illustrating design flaws in several existing electronic auction schemes. Furthermore, we provide a solution to these flaws using a group signature scheme and give recommendations for sound auction design.
Download

Paper Nr: 269
Title:

REMOTE HANDWRITTEN SIGNATURE AUTHENTICATION

Authors:

Jarrod Trevathan and Alan Mccabe

Abstract: This paper presents a secure real-time remote user authentication system based on dynamic handwritten signature verification. The system allows users to establish their identities to other parties in real-time via a trusted verification server. The system can be used to gain remote access to restricted content on a server or to verify a signature on a legal document. State of the art dynamic verification techniques are combined with proven cryptographic methods to develop a secure model for remote handwritten signature verification.
Download

Paper Nr: 73
Title:

SCHEDULING AND QOS FOR LEAK RATE IN POLICING MECHANISMS OVER TELECOMMUNICATIONS NETWORK

Authors:

Somchai Lekcharoen and Chanintorn Jittawiriyanukoon

Abstract: High-performance frame communication networks including VDSL have been conceived to carry traffic sources and support a continuum of transport rates ranging from low bit-rate to high bit-rate traffic. As a number of telecommunications traffic (bursty traffic) fluctuates on a certain network it results in congestion. The traditional policing mechanisms are finite-sized buffers with queue management techniques and fixed leak rate. Most queue management schemes employ fixed thresholds or a limited number of arrival frames, to determine when to allow or discard the entry of frames. However, traditional policing mechanisms have proved to be inefficient in coping with the conflicting requirements of ideal policing mechanisms, that is, low dropping frames and high conforming frames. An alternative solution based on artificial intelligence techniques, specifically, in the field of fuzzy systems is introduced. In this paper, a fuzzy control queue leak rate (QLR) of the buffer prior to policing mechanism is investigated. The performance of this alternative method is then compared with traditional policing mechanisms. Simulation results show that over VDSL network, the fuzzy control scheme helps improve performance of QLR in policing mechanisms. The performance of proposed method is much better than traditional policing ones.
Download

Paper Nr: 221
Title:

A PRELIMINARY EXPLORATION OF STRIPED HASHING - A probabilistic scheme to speed up existing hash algorithms

Authors:

George Davida and Jeremy A. Hansen

Abstract: Hash algorithms generate a fixed-size output from a variable-size input. Typical algorithms will process every byte of the input to generate their output, which, on a very large input, can be time consuming. The hashes’ potential slowness, coupled with recently reported attacks on the MD5 and SHA-1 hash algorithms, prompted a look at hashing from a different perspective. By generating several “striped” hashes, we may speed up the hash verification by a factor of the chosen stripe size.
Download

Paper Nr: 257
Title:

GENERATING SECURITY EVENT CORRELATION RULES THROUGH K-MEANS CLUSTERING

Authors:

Nelson Uto, Helen Teixeira, Andre Blazko, Marcos Ferreira de Paula, Renata C. Teixeira and Mamede Lima-marques

Abstract: Current implementations of intrusion detection systems (IDSs) have two drawbacks: 1) they normally generate far too many false positives, overloading human operators to such an extent that they can not respond effectively to the real alerts; 2) depending on the proportion of genuine attacks within the total network traffic, an IDS may never be effective. One approach to overcoming these obstacles is to correlate information from a wide variety of networks sensors, not just IDSs, in order to obtain a more complete picture on which to base decisions as to whether alerted events represent malicious activity or not. The challenge in such an analysis is the generation of the correlation rules that are to be used. At present, creating these rules is a time consuming manual task that requires expert knowledge. This work describes how data mining, specifically the k-means clustering technique, can be employed to assist in the semi-automatic generation of such correlation rules.
Download

Paper Nr: 282
Title:

DESIGN AND IMPLEMENTATION ASPECTS OF MANAGEMENT SYSTEMS FOR APPLICATION SERVICE PROVIDING

Authors:

Michael Höding

Abstract: This contribution discusses management software for Application Service providing (ASP). For the development of such software systems numerous specific requirements have to be considered. As examples we discuss aspects of heterogeneity. Because of this a flexible software engineering approach is necessary, covering design and implementation. For that we propose design patterns and component technology. The application of design patterns is demonstrated in examples.
Download

Area 3 - Wireless Communication Systems and Networks

Full Papers
Paper Nr: 225
Title:

FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6

Authors:

Christian Veigner and Chunming Rong

Abstract: In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.
Download

Paper Nr: 225
Title:

FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6

Authors:

Christian Veigner and Chunming Rong

Abstract: In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.
Download

Paper Nr: 225
Title:

FLOODING ATTACK ON THE BINDING CACHE IN MOBILE IPv6

Authors:

Christian Veigner and Chunming Rong

Abstract: In the next generation Internet protocol (IPv6), mobility is supported by means of Mobile IPv6 (MIPv6). As a default part of the MIPv6 protocol, route optimization is used to route packets directly to a mobile node’s currently used address at the mobile node’s visited subnet. Return Routability is the protocol suggested by the IETF for managing this task. Route optimization is often carried out during handovers, where a mobile node changes network attachment from one subnet to another. To offer seamless handovers to the user it is important that route optimizations are carried out quickly. In this paper we will present an attack that was discovered during design of a new and more seamless protocol than the Return Routability. Our improved route optimization protocol for Mobile IPv6 suffers this attack; therefore we wanted to investigate if a similar attack was feasible on the Return Routability protocol. In this paper, we show that our new route optimization protocol offers no less security than the already standardized Return Routability protocol in this field.
Download

Paper Nr: 242
Title:

PERFORMANCE OF VOIP OVER IEEE 802.11G DSSS-OFDM MODE WITH IEEE 802.11E QOS SUPPORT

Authors:

Gráinne Hanley, Seán Murphy and Liam Murphy

Abstract: This paper examines, via simulation, the performance of an 802.11e MAC over an 802.11g PHY operating in DSSS-OFDM mode. The DSSS-OFDM scheme provides data rates of up to 54Mb/s as well as interoperability with 802.11b nodes. Due to the widespread use of 802.11b nodes, such interoperability is an important consideration. This paper involves a study of the number of simultaneous bidirectional G.711 VoIP calls that can be supported by such a WLAN. The results show that this mode of operation introduces a very significant overhead. The actual number of calls that can be carried is limited to 12 when using the 24Mb/s data rate and 13 when using either the 36Mb/s or 54Mb/s rates. These results demonstrate the well-known disparity between uplink and downlink performance, with the downlink imposing the limit on the number of calls that can be carried by the system in the cases studied. The results also show that when when a significant amount of lower priority traffic is introduced into the system, it can have a significant impact on VoIP call capacity despite the use of 802.11e.
Download

Paper Nr: 263
Title:

ADVANCE DUPLICATE ADDRESS DETECTION (DAD) AND BUFFERING-BASED PROVISION OF SEAMLESS HANDOVER IN MOBILE IPV6

Authors:

Shobhan Adhikari

Abstract: Due to the concerns about the imminent crunch in available addresses in the previous version of Internet Protocol, IPv4, and to offer additional functionalities for new devices, IPv6 was proposed. Mobile IPv6 (MIPv6), an extension to IPv6, manages Mobile Nodes’ movements between wireless IPv6 networks. One of the most important considerations for Mobile IPv6 is handover management. It is desired that handover be fast and lossless. Seamless handovers are such that they incur minimum packet loss and delay. Various proposals have been made for seamless handover in MIPv6. By forwarding the packets destined to the Mobile Node towards the new point of attachment and storing the packets there until the Mobile Node has attached there, packet loss can be significantly decreased, and the delay associated with the forwarding is also less compared to forwarding from the previous point. In this paper, we study the performance of one such scheme which has optimized fast handover over hierarchical structure with buffering and simulation using NS-2 to evaluate packet loss and delay for UDP streams. It was observed that with the buffering scheme used, the handover was seamless. There was a difference in latencies with and without handover, as expected. It was observed that most of the performance factors studied depended on the data rate of the traffic. The factors were found to be more dependent on the data rate than on the speed of the Mobile Node.
Download

Paper Nr: 271
Title:

AN AUTOMATIC BLIND MODULATION RECOGNITION ALGORITHM FOR M-PSK SIGNALS BASED ON MSE CRITERION

Authors:

Vastram Naik, Anil Mahanta, Ratnajit Bhattacharjee and Harshal Nemade

Abstract: This paper addresses Automatic Blind Modulation Recognition (ABMR)problem, utilizing a Mean Square Error (MSE) decision rule to recognize and differentiate M-ary PSK modulated signals in presence of noise and fading. The performance of the modulation recognition scheme has been evaluated by simulating different types of PSK signals. By putting appropriate Mean Square Error Difference Threshold (MSEDT) on Mean Square Error (MSE), the proposed scheme has been found to recognize the different modulated signals with 100% recognition accuracy at Signal to Noise Ratio (SNR) as low as 1 dB in AWGN channels. The data samples required to be used for performing recognition is very small, thereby greatly reducing the time complexity of the recognizer. For fading signal Constant Modulus (CM) equalization has been applied prior to performing recognition. It has been observed that when CM equalization is used, 100 % recognition can be achieved at SNR as low as 6 dB.
Download

Paper Nr: 288
Title:

A COMPARATIVE STUDY OF IEEE 802.11 MAC ACCESS MECHANISMS FOR DIFFERENT TRAFFIC TYPES

Authors:

Mohammad Saraireh, Reza Saatchi, Samir Alkhayatt and Rebecca Strachan

Abstract: The fast growth and development of wireless computer networks and multimedia applications make the Quality of Service (QoS) provided to their transmission an important issue. This paper aims to investigate the impact of varying the number of active stations on the network performance. This was carried out using different data rates. The investigations also considered both MAC protocol access mechanisms, i.e. the basic access and the Request To Send / Clear To Send (RTS/CTS). The effect of traffic type i.e. Constant Bit Rate (CBR) and Variable Bit Rate (VBR) traffics was also examined. The findings revealed that in large networks (larger than 15 stations), the RTS/CTS access mechanism outperformed the basic access mechanism since the performance of the latter was more sensitive to the increase and decrease of the number of active stations. Increasing the data rate improved the network performance in term of delay and jitter but it degraded the network performance in term of channel utilisation and packet loss ratio.
Download

Short Papers
Paper Nr: 38
Title:

ITERATIVE MMSE DETECTION FOR MIMO/BLAST DS-CDMA SYSTEMS IN FREQUENCY SELECTIVE FADING CHANNELS - Achieving High Performance in Fully Loaded Systems

Authors:

João Silva, Nuno Souto, Francisco Cercas and Rui Dinis

Abstract: A MMSE (Minimum Mean Square Error) DS-CDMA (Direct Sequence-Code Division Multiple Access) receiver coupled with a low-complexity iterative interference suppression algorithm was devised for a MIMO/BLAST (Multiple Input, Multiple Output / Bell Laboratories Layered Space Time) system in order to improve system performance, considering frequency selective fading channels. The scheme is compared against the simple MMSE receiver, for both QPSK and 16QAM modulations, under SISO (Single Input, Single Output) and MIMO systems, the latter with 2Tx by 2Rx and 4Tx by 4Rx (MIMO order 2 and 4 respectively) antennas. To assess its performance in an existing system, the uncoded UMTS HSDPA (High Speed Downlink Packet Access) standard was considered.
Download

Paper Nr: 90
Title:

QUORUMS BASED MOBILES LOCATION SCHEME

Authors:

Chetta Nadia and Nadjib Badache

Abstract: Mobile location management is one of the most important problems in the mobile networks systems. Indeed, reducing the search cost increases the update cost and vice versa. That's why, a trade off between the search cost and update cost must be defined. This paper proposes a location management scheme based on quorums. The communication cost is reduced with our method because the information on a mobile location is saved in an efficient manner in a subset of location registers that change with the mobile moves. The proposed algorithm is evaluated in term of total cost of search and update, and is compared to Ihn-Han Bae algorithm.
Download

Paper Nr: 213
Title:

A WIRELESS VOICE/DATA COMMUNICATION SYSTEM IN A LARGE HOSPITAL

Authors:

Eisuke Hanada and Takato Kudou

Abstract: Computer systems, often called hospital information systems (HIS), have been installed in most large Japanese hospitals for administration of the basic medical information of patients, for making entries on medical charts, and for prescribing medication. In almost all cases, HIS have a server/client type structure, with the servers and client terminals connected with a LAN. For voice communication among the hospital staff, a landline telephone is often used. Fixed-line call systems (nurse call systems) are used for communication between patients and nurses. The potential demand for the introduction of wireless communication devices for data/voice communication into hospitals is high because of the promise of savings these technologies bring by improving patient service and labour efficiency. However, because of guidelines made to reduce problems that might be caused by electromagnetic interference (EMI) with medical electric devices and administrative fears about potential problems, the introduction of these systems has, until recently, been shelved in almost all cases. Because in recent years it has became possible to control the electromagnetic waves emitted by mobile communications apparatus and to protect against the possible occurrence of EMI, the number of hospitals introducing such wireless communication has grown. We report a case of a university hospital in which data and voice wireless communication have been safely and efficiently introduced
Download

Paper Nr: 215
Title:

OPTIMISATION OF HANDOFF PERFORMANCE IN WIRELESS NETWORKS USING EVOLUTIONARY ALGORITHMS

Authors:

Suresh Venkatachalaiah and Richard Harris

Abstract: In this paper we propose to improve handoff performance by applying a mobility prediction technique, which is optimised using evolutionary algorithms such as genetic algorithm and particle swarm optimisation. Here, we describe a hybrid technique that uses the Grey model in combination with fuzzy logic and evolutionary algorithms. Handoff is the call handling mechanism invoked when a mobile node moves from one cell to another and the accuracy in predicting mobility holds a key to handoff performance. Our model uses the received signal strength from the base stations to help the mobile device during handoff. We also describe the optimisation criterion adopted in this paper and compare the self-tuning algorithm and the two evolutionary algorithms in terms of accuracy and faster convergence time. The improved accuracy of the approaches is shown by comparing results of simulations and experiments.
Download

Paper Nr: 229
Title:

A PRICING MODEL OF GPRS NETWORKS WITH WI-FI INTEGRATION FOR “HEAVY” DATA USERS

Authors:

Saravut Yaipairoj, Fotios Harmantzis and Vinoth Gunasekaran

Abstract: As wireless services have become increasingly integrated and their demand is mounting, Wi-Fi provides an appealing opportunity for the GSM/GPRS operators to enhance their data capability. By integrating both networks, operators are able to provide 3G-like services. However, both networks have different data rates and capacity, which makes pricing a challenging issue. In this paper we propose a pricing model for GPRS networks integrated withWi-Fi, which applies to data users with high service demand (“heavy”). Through optimization technique, our proposed model identifies how the integration can play a significant role in increasing operators’ overall revenue and potentially improving the performance of GPRS networks.
Download

Paper Nr: 236
Title:

EFFICIENT CALL ADMISSION CONTROL FOR 3G NETWORKS - Chernoff-Bound based CAC

Authors:

Albert Mráz, Mihály Katona and Sándor Imre

Abstract: In the recent years the mobile telecommunication networks have gone through on a big development. The services of the systems have been extended very quickly, such as the number of the subscribers. The various multimedia and Internet systems have become quickly the part of our life. This phenomenon takes effect on mobile communication, too. The third-generation mobile networks could be the solution, which eliminate the defects of current systems and apply good solutions concerning both access and transport system. These 3G systems are able to meet the growing user demands and the mobile Internet requirements. Our goal is to use the scarce resources as efficiently as possible. We implemented a new, more efficient and faster call admission control than former methods. Our algorithm is able to be adapted directly for 3G mobile networks.
Download

Paper Nr: 237
Title:

PERFORMANCE EVALUATION OF 3G CORE NETWORK NODES

Authors:

Andrey Krendzel, Jarmo Harju and Sergey Lopatin

Abstract: Wireless network planning is a very complex process, the result of which influences on the success of network operators. A poorly planned network cannot achieve the required Quality of Service. It also involves extra costs and fewer benefits for its network operator. Actually, wireless network planning deals with a large number of different aspects. In this paper Core Network (CN) planning aspects for the third generation (3G) wireless systems are discussed. The problem of performance evaluation of 3G CN nodes for Internet Protocol Multimedia Core Network Subsystem (IM CN subsystem) is considered in details taking into account self-similarity caused by the high variability of burstiness of multiservice traffic in 3G wireless networks. The method for the problem solution is based on the use of FBM/D/1/W queueing system (FBM – Fractional Brownian Motion).
Download

Paper Nr: 243
Title:

THE ROBUSTNESS OF BLOCKING PROBABILITY IN A LOSS SYSTEM WITH REPEATED CUSTOMERS

Authors:

Akira Takahashi, Yoshitaka Takahashi, Shigeru Keneda and Yoshikazu Akinaga

Abstract: In this paper, we analyze and synthesize amulti-server loss systemwith repeated customers, arising out of NTT DoCoMo-developed telecommunication networks. We first provide the numerical solution for a Markovian model with exponential retrial intervals. Applying Little’s formula, we derive the main system performance measures (blocking probability and mean waiting time) for general non-Markovian models. We compare the numerical and simulated results for the Markovian model, in order to check the accuracy of the simulations. Via performing extensive simulations for non-Markovian (non-exponential retrial intervals) models, we find robustness in the blocking probability and the mean waiting time, that is, the performance measures are shown to be insensitive to the retrial intervals distribution except for the mean.
Download

Paper Nr: 243
Title:

THE ROBUSTNESS OF BLOCKING PROBABILITY IN A LOSS SYSTEM WITH REPEATED CUSTOMERS

Authors:

Akira Takahashi, Yoshitaka Takahashi, Shigeru Keneda and Yoshikazu Akinaga

Abstract: In this paper, we analyze and synthesize amulti-server loss systemwith repeated customers, arising out of NTT DoCoMo-developed telecommunication networks. We first provide the numerical solution for a Markovian model with exponential retrial intervals. Applying Little’s formula, we derive the main system performance measures (blocking probability and mean waiting time) for general non-Markovian models. We compare the numerical and simulated results for the Markovian model, in order to check the accuracy of the simulations. Via performing extensive simulations for non-Markovian (non-exponential retrial intervals) models, we find robustness in the blocking probability and the mean waiting time, that is, the performance measures are shown to be insensitive to the retrial intervals distribution except for the mean.
Download

Paper Nr: 244
Title:

SMSFormKit: A SYSTEM FOR PRESENTATION, VALIDATION AND UPDATE OF FORMS FOR MOBILE DEVICES

Authors:

Carlos Fernández, Juan P. Pece and Daniel Iglesia Iglesias

Abstract: Nowadays, many of the services offered by the mobile telephony don’t provide to the user a simple and intuitive tool to fill and send information. This way, the users have to code themselves the format of the message, with the corresponding annoyance and the possibility of making errors. One of the solutions to these problems could be provide forms that the user could fill and send from their mobile phones in a transparent way. SMSFORMKIT is an application which makes easier the creation of new services for mobile phones based on XForms. It has been implemented using J2ME as development environment and provides the following features: forms displaying, validation of the values provided by the user, submission of requests and forms update. Forms are displayed using J2ME high-level graphic elements. This fact guarantees the compatibility with most of the mobile phones in the market. The validation is carried out in the own application (local validation), and this way it is avoided the possible submission of a bad filled form to the server. Thus the server would only receive correct values. Besides, the update and submission of the forms can be done by SMS of GPRS.
Download

Paper Nr: 248
Title:

ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS

Authors:

Fernando Costa, Luciano Gaspary, Jorge Barbosa, Gerson Cavalheiro and Luciano Pfitscher

Abstract: Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.
Download

Paper Nr: 250
Title:

SEARCHING FOR RESOURCES IN MANETS - A cluster based flooding approach

Authors:

Rodolfo Oliveira, Luis Bernardo and Paulo Pinto

Abstract: In this paper, we propose a searching service optimized for highly dynamic mobile ad-hoc networks based on a flooding approach. MANETs unreliability and routing costs prevent the use of central servers or global infra-structured services on top of a priori defined virtual overlay networks. A flooding approach over a virtual overlay network created on-demand performs better. Flooding is supported by a light-weight clustering algorithm. The paper compares the relative efficiency of two clustering approaches using 1.5-hop and 2.5-hop neighborhood information, and of a non-clustered approach. It presents a set of simulation results on the clustering efficiency and on searching efficiency for low and high mobility patterns, showing that the 1.5-hop algorithm is more resilient to load and to node movement than the 2.5-hop algorithm.
Download

Paper Nr: 25
Title:

EVALUATING THE USAGE OF WIRELESS BROADBAND HOTSPOTS

Authors:

Ziad Hunaiti, Ammar Rahman, Wamadeva Balachandran and Zayed Huneiti

Abstract: This paper will discuss the results obtained from testing and evaluating the performance of public Wireless local Area Network (WLAN) hotspots in real life. A fully detailed analysis of a specially constructed testbed will be given. The construction was based on standard user equipments and provided near reality performance results. The paper will also present an overview of the bandwidth and quality of communication received by end-users. BT Openzone was chosen as the Hotspot provider to implement and carry out the tests. The results of these tests have shown the suitability of the public wireless networks in the United Kingdom to quality-critical applications.
Download

Paper Nr: 39
Title:

NOVEL TRANSFER POLICY MODEL TO ENHANCE THE SERVICEABILITY OF AN E-BUSINESS

Authors:

Jason C.T. Lo, Kang A. Wong and Wan W. Lin

Abstract: The novel statistical distribution independent transfer policy model (SDITPM) is proposed to improve the serviceability of a logical agent server in a pervasive computing environment. Serviceability is defined as the “chance of obtaining a required service within a defined period”. The SDITPM helps the agent to make sound migration decision by leveraging different primary metrics from which secondary ones are derived for the proportional (P), derivative (D), and integral (I) control elements. These elements are timely combined by planar and vertical integrations to form the final transfer probability that affirms a transfer policy decision to migrate. Therefore, The SDITPM is basically a PID controller that facilitates the decision making process.
Download

Paper Nr: 209
Title:

ONE-TO-ALL AND ALL-TO-ALL BROADCASTING ALGORITHMS IN CELLULAR NETWORKS

Authors:

Hiroshi Masuyama, Yuuta Fukudome and Tetsuo Ichimori

Abstract: In this paper, a one-to-all broadcasting algorithm on a mobile cellular network is first discussed as a minimum diameter spanning tree problem in a graph where every arc has a constant weight. An all-to-all broadcasting algorithm is next discussed on a subject of avoiding heavy traffic conditions. Finally, a faulttolerant broadcasting scheme is presented.
Download

Paper Nr: 226
Title:

ENERGY-CONSERVING ON-DEMAND ROUTING FOR MULTI-RATE MULTI-HOP NETWORKS

Authors:

Tsung-han Lee, Alan Marshall and Bosheng Zhou

Abstract: We present a novel scheme for conserving energy in multi-rate multi-hop wireless networks such as 802.11. In our approach, energy conservation is achieved by controlling the rebroadcast times of Route Request (RREQ) packets during path discovery in on-demand wireless routing protocols. The scheme is cross-layer in nature. At the network layer, the RREQ rebroadcast delay is controlled by the energy consumption information, and at the Physical layer, an energy consumption model is used to select both the rate and transmission range. The paper describes the energy-conserving algorithm at the network layer (ECAN), along with simulation results that compare the energy consumption of Ad-hoc On-Demand Distance Vector routing (AODV) with and without ECAN.
Download

Paper Nr: 233
Title:

MOBILE LOCALITY-AWARE MULTIMEDIA ON MOBILE COMPUTING DEVICES - A Bluetooth Wireless Network Infrastructure for a Multimedia Guidebook

Authors:

Matthew D'souza, Adam Postula, Neil Bergmann and Montserrat Ros

Abstract: This paper describes the implementation of a Bluetooth Village Guide Book (VGB) scenario for use in the Kelvin Grove Urban Village located in Brisbane, Australia. An Information Point Station Network (IPSN) was developed, along with software for two types of mobile computing devices. The implementation consists of several Information Point Stations (IPSs) placed at locations of significance, with access to information items on a centralized server. Once a user is registered on the network, he/she is given the opportunity to experience context- (and eventually user-) aware information on demand and in various multimedia formats. These information items are selected by the user, either by way of a menu system appearing on their mobile computing device or a more intuitive pointer-tag system. Information items are then ‘beamed’ to the user’s mobile computing device for the user to view. Bluetooth was selected as the medium of choice due to its prevalence on most modern mobile computing devices such as Personal Digital Assistants and mobile (cell) phones. This fact, coupled with the nature of Bluetooth communications lacking the requirement for line-of-sight meant users could retrieve location-aware information at the “locality” level. The implementation was found to be successful and was tested with multiple users accessing information items from a given IPS as well as multiple IPSs attached to the centralized server. Still, there is further work to be done on the VBG software, the user-registration system and on creating an embedded solution for the individual Information Point Stations.
Download

Paper Nr: 234
Title:

A BLUETOOTH BASED PROTOCOL FOR MULTIMEDIA GUIDEBOOKS ON MOBILE COMPUTING DEVICES - Experiencing Mobile Locality-Aware Multimedia in the Palm of Your Hand

Authors:

Matthew D'souza, Adam Postula, Neil Bergmann and Montserrat Ros

Abstract: This paper presents a Bluetooth based communications protocol used for multimedia guidebooks on mobile computing devices. Multimedia guidebooks are used in museums to allow users to access information about museum exhibits. The multimedia guidebook protocol was successfully implemented on a personal digital assistant and mobile (cell) phone platforms. The protocol overcomes some of the wireless file transfer protocol limitation issues with mobile computing devices. The protocol uses Bluetooth wireless connections as a communications medium. The protocol can be used to transfer various file formats such as image or audio files. The protocol also identifies the language content of the information file. Future work on this protocol involves expanding it to allow for other languages to be included and other user preferences such as personal interests and file download options.
Download

Paper Nr: 240
Title:

MOVILTOOTH: CONTEXT-AWARE SYSTEM FOR MOBILE PHONES BASED ON BLUETOOTH TECHNOLOGY

Authors:

Juan P. Pece, Carlos Fernández and Carlos Escudero

Abstract: Nowadays the amount of accessible information across Internet is enormous. Context-aware systems try to filter and to adapt that information to the environment of the user who requests it. This paper introduces a context-aware system that uses the physical location of the request origin. The system is designed for mobile devices using Bluetooth radio-frequency technology for data transfer and location system. The main feature of the system is its low cost and simplicity.
Download

Paper Nr: 286
Title:

MULTILATERAL SECURITY CONSIDERATIONS FOR ADAPTIVE MOBILE APPLICATIONS

Authors:

Adrian Spalka, Armin B. Cremers and Marcel Winandy

Abstract: Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality. But to make this technology a success, the security of all concerned parties must be addressed. This work presents a multilateral security examination in two stages. We first introduce a co-operation model and state the security requirements from the perspective of each party. In the second stage we investigate the set of all requirements with respect to conflicts, state each party’s role in the enforcement and suggest a realisation. The result is a comprehensive picture of the security aspects of adaptive applications in mobile environments.
Download

Area 4 - Multimedia Signal Processing

Short Papers
Paper Nr: 72
Title:

PROPERTIES OF DOMINANT COLOR TEMPERATURE DESCRIPTOR

Authors:

Karol Wnukowicz and Wladyslaw Skarbek

Abstract: The concept of color temperature is derived from an innate characteristics of the human visual system. It is formulated as a visual feature referring to a kind of perceptual feeling about perceived light. Color temperature has also a physical-based definition, and hence, color temperature of observed scenes and visual objects can be modelled in a mathematical way as a one-parameter characteristics of perceived light. In the Amendment to the Visual Part of the MPEG-7 Standard the Color Temperature descriptor for image browsing has been proposed. To extend the functionality of content-based image search by color temperature we proposed the Dominant Color Temperatures descriptor, which allows a user to perform query by example and query by value searches. The extraction algorithm was originally adopted from dominant color’s one, which utilizes vector quantization in 3D color space. We also proposed a second, much faster algorithm based on scalar quantization in one-dimensional color temperature space. In this paper we present a comparison of the two extraction algorithms. We also compare the querying results of the Dominant Color Temperature descriptor and two conceptually related descriptors: Dominant Color and Color Temperature.
Download

Paper Nr: 217
Title:

TEST ENVIRONMENT FOR PERFORMANCE EVALUATION OF AN INTERNET RADIO

Authors:

David Melendi, Manuel Vilas, Xabiel G. Pañeda, Victor G. Garcia and Roberto Garcia

Abstract: This paper presents a test environment designed to improve Internet radio services through the evaluation of different service features. The environment comprises the generation of audio streams, the delivery of those streams through different communication networks, and the access of final users to those contents. A broad set of service architectures can be emulated, and several network configurations can be deployed using the available communication devices. It is also possible to simulate users’ behaviour thanks to a workload generator that can be configured using statistical information obtained from real service access data. A case study is also presented, where a glimpse of the possibilities of the environment can be caught. This test environment will allow service administrators or research teams to predict what will happen in a real service if its configuration is modified, or if user behaviour changes. Furthermore, managers will be capable of knowing whether an Internet radio service can be improved or not.
Download

Paper Nr: 217
Title:

TEST ENVIRONMENT FOR PERFORMANCE EVALUATION OF AN INTERNET RADIO

Authors:

David Melendi, Manuel Vilas, Xabiel G. Pañeda, Victor G. Garcia and Roberto Garcia

Abstract: This paper presents a test environment designed to improve Internet radio services through the evaluation of different service features. The environment comprises the generation of audio streams, the delivery of those streams through different communication networks, and the access of final users to those contents. A broad set of service architectures can be emulated, and several network configurations can be deployed using the available communication devices. It is also possible to simulate users’ behaviour thanks to a workload generator that can be configured using statistical information obtained from real service access data. A case study is also presented, where a glimpse of the possibilities of the environment can be caught. This test environment will allow service administrators or research teams to predict what will happen in a real service if its configuration is modified, or if user behaviour changes. Furthermore, managers will be capable of knowing whether an Internet radio service can be improved or not.
Download

Paper Nr: 283
Title:

AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM

Authors:

Xiaoyun Wang

Abstract: In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.
Download

Paper Nr: 283
Title:

AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM

Authors:

Xiaoyun Wang

Abstract: In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.
Download

Paper Nr: 283
Title:

AN EFFICIENT PROXY SIGNATURE SCHEME IN HOME NETWORK DRM

Authors:

Xiaoyun Wang

Abstract: In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.
Download

Paper Nr: 218
Title:

METHOD FOR AUDIO/VIDEO STREAMING TESTBED DEFINITION AND MODEL DEVELOPMENT

Authors:

Xabiel G. Pañeda, Victor G. Garcia, David Melendi, Manuel Vilas and Roberto Garcia

Abstract: This paper presents a method to develop lab experiments for audio/video services, both using testbed and simulation models. Audio/video services in the Internet have special characteristics which make them very difficult to configure. Our research group has designed a methodology (Pañeda, 2004) for video-on-demand service analysis and configuration. In this methodology, the analysis phase is divided into two independent parts, one which works on data extracted from the behaviour of the real service, and another which works on predictions. The latter uses simulation models and testbeds to evaluate situations which may appear in a near future. In all the cases, a method must be used to specify the experiments. This method must determine elements such as: goals establishment, experiment generation process, the input data for the workload definition, etc.
Download