Skip to main content

2010 | Buch

Communication and Networking

International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I

herausgegeben von: Tai-hoon Kim, Alan Chin-Chen Chang, MingChu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Ślęzak

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking (FGCN 2010) – one of the partnering events of the Second International Mega-Conference on Future Generation Information Te- nology (FGIT 2010). FGCN brings together researchers from academia and industry as well as practit- ners to share ideas, problems and solutions relating to the multifaceted aspects of communication and networking, including their links to computational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 228 papers submitted to the FGCN 2010 Regular Sessions. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were - cepted for FGIT 2010, while 45 papers were accepted the FGCN 2010 Regular S- sions. Of the 45 papers, 8 were selected for the special FGIT 2010 volume published by Springer in LNCS series. 29 papers are published in this volume, and 8 papers were withdrawn due to technical reasons. We would like to acknowledge the great effort of the FGCN 2010 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of the conference would not have been possible without the huge support from our Sponsors and the work of the Chairs and Organizing Committee.

Inhaltsverzeichnis

Frontmatter
Multiple Object Tracking in Unprepared Environments Using Combined Feature for Augmented Reality Applications
Abstract
Existing augmented reality (AR) applications performs well in tracking objects in prepared environments. However, tracking multiple objects in unprepared environments involves considerable difficulty to achieve best results since users are not allowed to modify the real environment such as in outdoor applications. This research focuses on a multiple object tracking based on combined feature tracking and color tracking in an arbitrary scene to demonstrate superior performance. This approach is beneficial to tracking technologies since additional visual cues provide seamless real-synthetic world integration. The system requires accurate measurements of the six-degree of freedom (6DOF) camera pose, three-degree of freedom (3DOF) for position and three for orientation relative to the world coordinate system. Our framework aims to lead AR applications in unprepared environments with multiple tracking objects regardless of the movement of real objects, lights and cameras.
Giovanni Cagalaban, Seoksoo Kim
Study on the Future Internet System through Analysis of SCADA Systems
Abstract
Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.
Jae-gu Song, Sungmo Jung, Seoksoo Kim
A Novel Channel Assignment Scheme for Multi-channel Wireless Mesh Networks
Abstract
An important issue of multi-channel multi-radio wireless mesh network (MRMC-WMN) is how to assign multiple available channels to the radios in order to minimize the wireless communication interference and maximize the network throughput. In this work, we study the problem of channel assignment in MRMC-WMN, and the optimization problem is known to be NP-complete. We propose a novel dynamic channel assignment scheme which can be performed in distributed manner. Moreover, our scheme is suitable for both unicast and multicast communication. The analysis and comparison demonstrates that our proposed scheme is feasible and more efficient compared with the existing distributed channel assignment schemes.
Yan Xia, Zhenghu Gong, Yingzhi Zeng
Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
Abstract
A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature that can be verified by anyone. In this paper, we elaborate on the merits of CAE and secret sharing schemes to propose two new (t,n) threshold authenticated encryption schemes for hierarchical structures. Our proposed schemes not only allow i-th level participants to support the (i+1)-th level participants to generate the authenticated encryption messages, but also allow the participants of i-th or higher levels to cooperatively generate the valid ones. Any authenticated ciphertext for a message is addressed to a specified group of signers in such a way that the ability to generate the ciphertext is regulated by the adopted (t,n) threshold schemes. Furthermore, the proposed schemes achieve the security requirements of an authenticated encryption scheme.
Chien-Lung Hsu, Yu-Li Lin, Tzong-Chen Wu, Chain-Hui Su
An Active Queue Management for QoS Guarantee of the High Priority Service Class
Abstract
In this paper, we propose the active queue management mechanism (Active-WRED) for guaranteeing the quality of the high priority service class (VoIP or IPTV) in the multi-class traffic service environment. In the congestion situation, this mechanism increases the drop probability of the low priority traffic and reduces the drop probability of the high priority traffic; therefore it can guarantee the quality of the high priority service class from the poor quality by the packet loss.
Hyun Jong Kim, Jae Chan Shim, Hwa-Suk Kim, Kee Seong Cho, Seong Gon Choi
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
Abstract
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Tien-ho Chen, Hsiu-lien Yeh, Pin-chuan Liu, Han-chen Hsiang, Wei-kuan Shih
New Mechanism for Global Mobility Management Based on MPLS LSP in NGN
Abstract
This paper proposes a new mobility management (MM) scheme, using Label Switched Path (LSP) of Multi Protocol Label Switching (MPLS) for seamless service in IP-based Next Generation Network. The proposed scheme delivers signaling messages by using L2.5 switching method based on MPLS LSP. So, it can overcome problems from existing schemes, such as PMIP or MIP. We analyze each scheme numerically and verify that the proposed scheme has better performance than others on handover latency, packet loss, location update cost and overall cost.
Myoung Ju Yu, Kam Yong Kim, Hwa Suk Kim, Kee Seong Cho, Seong Gon Choi
A Fault-Tolerant and Energy Efficient Routing in a Dense and Large Scale Wireless Sensor Network
Abstract
In a wireless sensor network, a large number of small-size cheap sensor nodes are scattered, and have limited resources such as battery power, data processing capability and memory capacity. They should show fault-tolerance, energy efficiency, and topological adaptation to the change of external environment, therefore, an effective routing algorithm is essential. In general, if a network is large in scale, multi-hop transmission is more energy efficient than direct transmission. In case a large number of nodes are deployed densely within a fixed 1-hop communication range, however, many nodes participate in data transmission, multi-hop transmission consumes much more energy in such a case. Thus, this study proposes a routing algorithm that solves above problems at the same time in a dense and large scale sensor network. The result of experiment showed that routing algorithm proposed in this study has reasonable fault-tolerance, energy efficiency, and offers its adaptability to topological changes in a dense and large scale sensor network.
Seong-Yong Choi, Jin-Su Kim, Yang-Jae Park, Joong-Kyung Ryu, Kee-Wook Rim, Jung-Hyun Lee
Network Management Framework for Wireless Sensor Networks
Abstract
Network Management is the process of managing, monitoring, and controlling the network. Conventional network management was based on wired network which is heavy and unsuitable for resource constrained WSNs. WSNs can have large scale network and it is impossible to manage each node individually. Also, polling mechanism of Simple Network Management Protocol (SNMP) impose heavy management traffic overhead. Since management messages consume resources of WSNs, it can affect the performance of the network. Therefore, it is necessary for WSNs to perform energy efficient network management. In this paper, we will propose network management framework. We will introduce cluster-based network management architecture, and classify the Management Information Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.
Jaewoo Kim, HahnEarl Jeon, Jaiyong Lee
FDAN: Failure Detection Protocol for Mobile Ad Hoc Networks
Abstract
This work deals with fault tolerance in distributed MANET (Mobile Ad hoc Networks) systems. However, the major issue for a failure detection protocol is to confound between a fault and a voluntary or an involuntary disconnection of nodes, and therefore to suspect correct nodes to be failing and conversely. Within this context, we propose in this paper a failure detection protocol that copes with MANET systems constraints. The aim of this work is to allow to the system to launch recovery process. For this effect, our protocol, called FDAN, is based on the class of heartbeat protocols. It takes into account: no preliminary knowledge of the network, the nodes disconnection and reconnection, resources limitation...Hence, we show that by using temporary lists and different timeout levels, we achieve to reduce sensibly the number of false suspicions.
Haroun Benkaouha, Abdelkrim Abdelli, Karima Bouyahia, Yasmina Kaloune
Interference Avoiding Radio Resource Allocation Scheme for Multi-hop OFDMA Cellular Networks with Random Topology
Abstract
Relaying technology is the one of the solutions to expand the coverage and enhance the throughput of a cellular network with low cost, therefore numerous smart relay stations (RSs) which are able to schedule its own transmission frame and manage radio resources allocated by its serving base station (BS) will be deployed within the cellular network. while more RSs are deployed, the network topology is turning to the random topology. In the random topology, however, conventional frequency reuse schemes based on the uniformly distributed RSs are not adoptable because of the randomness for locations of RSs. Another problem is severe increase of interference during the transmission period for an access link because more transmitters including BSs and RSs are existed within a cell. We suggest the random-topology frequency reuse (RFR) scheme supporting the frequency reuse in the cellular multi-hop network with random topology to reduce intra-cell interference. The simulation results show RFR is reducing the overall intra-cell interference compared to the full allocation scheme whose reuse factor is one. The throughput and average signal to interference plus noise ratio (SINR) is still greater than the full allocation scheme although the spectral efficiency is lower than the compared scheme.
Sunggook Lim, Jaiyong Lee
Topology Control Method Using Adaptive Redundant Transmission Range in Mobile Wireless Sensor Network
Abstract
In this paper, we simulate the effect of RTR (Redundant Transmission Range) which is used to maintain network connectivity in mobile wireless networks such as ad-hoc or sensor networks. The simulation result shows that the RTR scheme greatly increases network connectivity time. Based on the simulation result, we propose an A-RTR (Adaptive-RTR) algorithm. A-RTR use variable RTR as node’s moving speed and neighbors’ speed. This algorithm can be used any topology control algorithms and prolong the network connectivity time in mobility environment. Simulation results show good performance not only the network connectivity but also node’s energy consumption.
MyungJun Youn, HahnEarl Jeon, SeogGyu Kim, Jaiyong Lee
Timer and Sequence Based Packet Loss Detection Scheme for Efficient Selective Retransmission in DCCP
Abstract
Data Congestion Control Protocol (DCCP) is new transport protocol for multimedia applications. Although the standard DCCP does not provide retransmission scheme, many research works have proposed selective retransmission methods for DCCP to improve QoS of applications. However, these researches do not consider packet loss detection scheme although existing packet loss detection schemes are not appropriate for efficient retransmission. This paper proposes a new packet loss detection method for efficient selective retransmission in DCCP. The proposed scheme detects packet loss by using timer and out of sequence packets. Simulation results show that the proposed method improves the performance of retransmission by detecting packet loss more quickly and accurately.
BongHwan Oh, Jechan Han, Jaiyong Lee
Transposed UL-PUSC Subcarrier Allocation Technique for Channel Estimation in WiMAX
Abstract
This paper introduces a new pilot pattern design for channel estimation in WiMAX. Current WiMAX systems use a subcarrier allocation technique known as Uplink Partial Usage of Subcarriers (UL-PUSC). It is based on tile structure that consists of 4 subcarriers by 3 OFDMA symbols with 4 pilots in the corners to aid the channel estimation process. We propose a new pilot pattern called “transposed UL-PUSC”. It consists of 3 subcarriers by 4 OFDMA symbols. We compare between the performance of the conventional UL-PUSC and our proposed one under different radio channel conditions. We finally propose an adaptive algorithm that selects the optimum pilot pattern based on channel conditions.
Maged M. Khattab, Hesham M. EL-Badawy, Mohamed A. Aboul-Dahab
Load Performance Evaluation of the SSD According to the Number of Concurrent Users
Abstract
In this paper, we designed DRAM-SSD and analyzed the load performance of DRAM-SSD and HDD according to the number of concurrent users. In experimental results, we showed that load performance of DRAM-SSD is about 20times more than that of the HDD. DRAM-SSD is useful for application which has many concurrent users such as first come first served system.
Seung-Kook Cheong, Dae-Sik Ko
Experimental Investigation of the Performance of Vertical Handover Algorithms between WiFi and UMTS Networks
Abstract
In this paper, we analyze the performance of vertical handover (VHO) algorithms for seamless mobility between WiFi and UMTS networks. We focus on a no-coupling scenario, characterized by the lack of any form of cooperation between the involved players (users and network operators). In this context, we first propose a low-complexity Received Signal Strength Indicator (RSSI)-based algorithm, and then an improved hybrid RSSI/goodput version. We present experimental results based on the implementation of a real testbed with commercial WiFi (Guglielmo) and UMTS (Telecom Italia) deployed networks. Despite the relatively long handover times experienced in our testbed, the proposed RSSI-based VHO algorithm guarantees an effective goodput increase at the MTs. Moreover, this algorithm mitigates the ping-pong phenomenon.
Stefano Busanelli, Marco Martalò, Gianluigi Ferrari, Giovanni Spigoni, Nicola Iotti
Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network
Abstract
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn’t any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.
Randy S. Tolentino, Kijeong Lee, Yong-Tae Kim, Gil-Cheol Park
A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment
Abstract
Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information.  Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.
Kijeong Lee, Randy S. Tolentino, Gil-Cheol Park, Yong-Tae Kim
An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique
Abstract
With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.
Yoon-Su Jeong, Yong-Tae Kim
Design of a Software Configuration for Real-Time Multimedia Group Communication; HNUMTP
Abstract
This paper designs transport protocol of multi-session/channel method for real time multimedia group telecommunication and realizes it. The special features of the designed and realized protocol are first, that it solved the sync problem which is the specific character of multimedia telecommunication by using multi-channel method protocol. Usual multimedia telecommunication is assigned one channel by each media data. This paper shortened the phenomenon that waits data for sync of receiving part by assigning more than one channel for the channel that has a lot of data per hour as video data. The problem of intermedia synchronization that happens then could be solved by sending temporal/spacial related data among data assigning extra control channel. Second, that it does integrated management for sessions. Each session is one group telecommunication unit which supports mutual working environment that is independent. Each session communicates the participants in the group independently, the session manager manages all the communication among groups and lets media sources connected with all network be operated efficiently.
Gil-Cheol Park
Recognition Technique by Tag Selection Using Multi-Reader in RFID Environment
Abstract
The use of RFID(Radio Frequency Identification) is recently increasing for the realization of Ubiquitous computing. Reducing the process time of tag recognition is crucial as RFID system has to recognize multiple objects in a short amount of time. In this manuscript, therefore, an effective scheme is suggested to improve processing speed for tag authentication in RFID system. The suggested scheme retrieves selected tag ID only by using multi-reader in the process of tag authentication and consequently reduces the processing time required for tag authentication in database. The use of the suggested scheme cuts down on the process amount of arithmetic throughput bringing about performance improvement of RFID system.
Bong-Im Jang, Yong-Tae Kim, Gil-Cheol Park
UWB-Based Tracking of Autonomous Vehicles with Multiple Receivers
Abstract
In this paper, we consider real-time tracking of an Autonomous Guided Vehicle (AGV) in an indoor industrial scenario. An on-board odometer provides information about the dynamic state of the AGV, allowing to predict its pose (position and orientation). At the same time, an external Ultra Wide Band (UWB) wireless network provides the information necessary to compensate the error drift accumulated by the odometer. Two novel alternative solutions for real-time tracking are proposed: (i) a classical Time Differences of Arrivals (TDOA) approach with a single receiver; (ii) a “Twin-receiver” TDOA (TTDOA) approach, that requires the presence of two independent receivers on the AGV. The performance of the two proposed algorithms is evaluated in realistic conditions. The obtained results clearly show the tradeoff existing between the frequency of UWB measurements and their quality.
Stefano Busanelli, Gianluigi Ferrari
Information System for Electric Vehicle in Wireless Sensor Networks
Abstract
Electric vehicle (EV)/plug-in hybrid electric vehicle (PHEV) grid infrastructure is to increase the stability of local power system by managing the charging operations. A user interface device equipped on EVs allows the driver to receive instructions or seeks advice to manage EV’s battery charging/backfill process. In this paper, we design vehicle-grid communications system. To improve the performance of the system, we customize our communication protocol for distributing EV charging information. From the experiments, we verify the performance of our protocol with respect to the data delivery ratio and the number of message forwarding.
Yujin Lim, Hak-Man Kim, Sanggil Kang
Maximizing Minimum Distance to Improve Performance of 4-D PSK Modulator for Efficient Wireless Optical Internet Access and Digital Modulation
Abstract
We have computed the 4-dimensional vectors of 16, 64, and 256-point with maximized minimum distance using the optimization technique. With the 4-dimensional vectors, we introduce two communication schemes, wireless optical communication scheme, and the 4-dimensional PSK modulators to improve performance. In wireless communication scheme, the 4-dimensional Multiple-Subcarrier Modulation with fixed bias achieves the normalized power requirements reduced to 1.8 dB, 2.6 dB, and 5.0 dB compared to those of the conventional schemes including QPSK, 8-PSK, and 16-PSK, respectively. In the 4-dimensional PSK modulators, up to 4.8 dB gain is obtained.
Hae Geun Kim
Implementation of the Vehicle Black Box Using External Sensor and Networks
Abstract
With the increasing uses of black boxes for vehicles, they are being widely studied and developed. Existing black boxes store only video and sound, and have limitations in accurately identifying accident contexts. Besides, data are lost if the black box in the vehicle is damaged. In this study, a smart black box was manufactured by storing the additional data, including on the tire pressure, in-vehicle data (e.g., head lamp operation), current location, travel path and speed, and video and sound, using OBD-II and GPS to improve the efficiency and accuracy of accident analysis. An external storage device was used for data backup via wireless LAN to allow checking of data even when the black box is damaged.
Sung-Hyun Back, Jang-Ju Kim, Mi-Jin Kim, Hwa-Sun Kim, You-Sin Park, Jong-Wook Jang
Implementation of a SOA-Based Service Deployment Platform with Portal
Abstract
In this paper we propose a Service Oriented Architecture to provide a flexible and serviceable environment. SOA comes up with commercial requirements; it integrates many techniques over ten years to find the solution in different platforms, programming languages and users. SOA provides the connection with a protocol between service providers and service users. After this, the performance and the reliability problems are reviewed. Finally we apply SOA into our Grid and Hadoop platform. Service acts as an interface in front of the Resource Broker in the Grid, and the Resource Broker is middleware that provides functions for developers. The Hadoop has a file replication feature to ensure file reliability. Services provided on the Grid and Hadoop are centralized. We design a portal, in which users can use services on it directly or register service through the service provider. The portal also offers a service workflow function so that users can customize services according to the need of their jobs.
Chao-Tung Yang, Shih-Chi Yu, Chung-Che Lai, Jung-Chun Liu, William C. Chu
A Mobile GPS Application: Mosque Tracking with Prayer Time Synchronization
Abstract
Global Positioning System (GPS) is a popular technology applied in many areas and embedded in many devices, facilitating end-users to navigate effectively to user’s intended destination via the best calculated route. The ability of GPS to track precisely according to coordinates of specific locations can be utilized to assist a Muslim traveler visiting or passing an unfamiliar place to find the nearest mosque in order to perform his prayer. However, not many techniques have been proposed for Mosque tracking. This paper presents the development of GPS technology in tracking the nearest mosque using mobile application software embedded with the prayer time’s synchronization system on a mobile application. The prototype GPS system developed has been successfully incorporated with a map and several mosque locations.
Rathiah Hashim, Mohammad Sibghotulloh Ikhmatiar, Miswan Surip, Masiri Karmin, Tutut Herawan
Backmatter
Metadaten
Titel
Communication and Networking
herausgegeben von
Tai-hoon Kim
Alan Chin-Chen Chang
MingChu Li
Chunming Rong
Charalampos Z. Patrikakis
Dominik Ślęzak
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-17587-9
Print ISBN
978-3-642-17586-2
DOI
https://doi.org/10.1007/978-3-642-17587-9

Premium Partner