By Topic

The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services

17-21 July 2005

Filter Results

Displaying Results 1 - 25 of 67
  • MobiQuitous 2005. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services - Table of contents

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2005, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • A reputation-based mechanism for isolating selfish nodes in ad hoc networks

    Publication Year: 2005, Page(s):3 - 11
    Cited by:  Papers (39)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    For ad hoc networks to realize their potential in commercial deployments, it is important that they incorporate adequate security measures. Selfish behavior of autonomous network nodes could greatly disrupt network operation. Such behavior should be discouraged, detected, and isolated. In this paper, we propose a reputation-based mechanism to detect and isolate selfish nodes in an ad hoc network. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure reporting of traffic forwarding activity in mobile ad hoc networks

    Publication Year: 2005, Page(s):12 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defend against cache consistency attacks in wireless ad hoc networks

    Publication Year: 2005, Page(s):22 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. To maintain strong cache consistency in some strategic scenarios (e.g., battle fields), the invalidation-based approach is preferred due to its low overhead. However, this approach may suffer from some security attacks. Fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ECA-P policy-based framework for managing ubiquitous computing environments

    Publication Year: 2005, Page(s):33 - 42
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Ubiquitous computing environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds of tasks. One way by which administrators and end-users can manage these environments is through the use of policies. In particular, obligation policies are used to specify what actions must or must not be performed by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-based routing in mobile ad hoc networks

    Publication Year: 2005, Page(s):45 - 55
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized by scarce resources and a lack of fixed infrastructure. We propose and evaluate three content-based routing protocols: CBR is an adaptation of existing distributed publish/subscribe protocols for wired networks, FT-CBR ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-constraint dynamic access selection in always best connected networks

    Publication Year: 2005, Page(s):56 - 64
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    In future generation networks, various access technologies, such as Wi-Fi, Bluetooth, GPRS and UMTS, etc., are simultaneously available to mobile devices. They vary in characteristics (communication range, power consumption, security, etc.) and QoS parameters (bandwidth, delay, etc.) The notion of always best connected (ABC) enables people to run applications over the most efficient combination of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended ZRP: a routing layer based service discovery protocol for mobile ad hoc networks

    Publication Year: 2005, Page(s):65 - 72
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Service discovery in mobile ad hoc networks is an essential process in order for these networks to be self-configurable with zero or minimal administration overhead. In this paper we argue that service discovery can be greatly enhanced in terms of efficiency (regarding service discoverability and energy consumption), by piggybacking service information into routing layer messages. Thus, service di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Market models and pricing mechanisms in a multihop wireless hotspot network

    Publication Year: 2005, Page(s):73 - 82
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Multihop wireless hotspot network [A. Balachandran et al., (2003), F. Fitzek et al., (2003), Y-D. Lin et al., (1999), K-C. Wang et al., (2003)] has been recently proposed to extend the coverage area of a base station. However, with selfish nodes in the network, multihop packet forwarding cannot take place without an incentive mechanism. In this paper, we adopt the "pay for service" incentive model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SWAT: small world-based attacker traceback in ad-hoc networks

    Publication Year: 2005, Page(s):85 - 96
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Mobile ad hoc networks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/DDoS attacker traceback is especially challenging in MANETs for the lack of infrastructure. In this paper, we propose an efficient on-the-fly search technique, SWAT, to trace back DoS and DDoS attackers in MANETs. Our sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlation analysis for alleviating effects of inserted data in wireless sensor networks

    Publication Year: 2005, Page(s):97 - 108
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-temporal correlation analysis called "Abnormal Relationships Test (ART)" to effectively detect, respond and immune to inserted spoofed data from both various-ID impersonators and compromised nodes. Also a systematic approach i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient aggregation of encrypted data in wireless sensor networks

    Publication Year: 2005, Page(s):109 - 117
    Cited by:  Papers (127)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) are ad-hoc networks composed of tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to the lifetime of a WSN to minimize the number of bits sent by each device. One well-known approach is to aggregate sensor data (e.g., by adding) along the path from sensors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical broadcast authentication in sensor networks

    Publication Year: 2005, Page(s):118 - 129
    Cited by:  Papers (47)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. μTESLA and multi-level μTESLA have been proposed to provide such services for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level μTESLA schemes can scale up to larg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PPP migration: a technique for low-latency handoff in CDMA2000 networks

    Publication Year: 2005, Page(s):133 - 144
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In current CDMA2000 standard, a packet data serving node (PDSN) acts as an IP gateway to the Internet. Mobile nodes (MN) connect to a PDSN using a point-to-point (PPP) session and IP packets are tunneled over the PPP session from the client to the PDSN which then routes the packets onto a packet network. A CDMA2000 network is a hierarchical network where packets from an MN to the PDSN are transpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A relay based MAC protocol to support multi-rate feature in mobile ad hoc networks

    Publication Year: 2005, Page(s):145 - 154
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Multi-rate feature is an important advance in wireless communications. It enables wireless devices to operate at high data rate when the channel condition is sufficiently good. Existing ad hoc routing protocols can not perform very well in the multi-rate ad hoc networks because they generally assume that bandwidth of different links are identical in the system. One straightforward solution to this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPA assisted optimized proactive handoff scheme

    Publication Year: 2005, Page(s):155 - 165
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    In order to support session-based real-time communication in a highly mobile environment it is desirable to limit end-to-end delay, jitter and packet loss at a certain threshold level. This paper describes a framework of media-independent pre-authentication (MPA), a new handover optimization mechanism that has a potential to address issues on existing mobility management protocols and mobility opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification

    Publication Year: 2005, Page(s):166 - 172
    Cited by:  Papers (147)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In RFID system, one of the problems that we must solve is the collision between tags which lowers the efficiency of the RFID system. One of the popular anti-collision algorithms is ALOHA-type algorithms, which are simple and shows good performance when the number of tags to read is small. However, they generally require exponentially increasing number of slots to identify the tags as the number of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Loosely coupling ontological reasoning with an efficient middleware for context-awareness

    Publication Year: 2005, Page(s):175 - 182
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    Context-awareness in mobile and ubiquitous computing requires the acquisition, representation and processing of information which goes beyond the device features, network status, and user location, to include semantically rich data, like user interests and user current activity. On the other hand, when services have to be provided on-the-fly to many mobile users, the efficiency of reasoning with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextualizing applications via semantic middleware

    Publication Year: 2005, Page(s):183 - 189
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The use of description logics (DLs) in modeling various real-world domains, and reasoning about them, has well-known benefits. We believe that the same framework can be used for representing a user-centric view of usage contexts. A DL-reasoner can then be used for organizing context definitions, merging domain knowledge into these definitions, and performing recognition of contexts from sensor inp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.