Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Future Generation Communication and Networking (FGCN 2007)

Date 6-8 Dec. 2007

Go

Filter Results

Displaying Results 1 - 25 of 126
  • Future Generation Communication and Networking - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1750 KB)  
    Freely Available from IEEE
  • Future Generation Communication and Networking - Title page

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Future Generation Communication and Networking - Copyright

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Future Generation Communication and Networking - Table of contents

    Publication Year: 2007 , Page(s): v - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • Message from the FGCN Workshop Co-Chairs

    Publication Year: 2007 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Lightweight Session Key Management Scheme in Sensor Networks

    Publication Year: 2007 , Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (179 KB) |  | HTML iconHTML  

    The necessity to secure the communication between wireless sensor networks nodes becomes important with the system nodes are being deployed for a wide variety of applications. In this paper, we propose a new approach for session key management among group sensor nodes. We use initial trust node to build a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links. Each shared key used only once after the set of shared keys are built. Our session scheme exhibits a nice power efficient and excellent updating communications keys. At the same time our scheme updating keys go with exchanging message. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed management schemes can achieve a good level of security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home Device Authentication Method Based on PKI

    Publication Year: 2007 , Page(s): 7 - 11
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    As home network service is popularized, the kind of smart device is rising up and home appliances are becoming intelligent. Device authentication process is necessary that we safely use these devices and construct secure home network environment. In this paper, we proposed home device authentication framework and home device certificate profile. And also we describe home device registration process and home device certificate issuing process. Our home device certificate profile is based on the internet X.509 version 3 certificate. And our device authentication framework adheres to basic concept of general PKI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Typical Behavior Patterns Extraction and Anomaly Detection Algorithm Based on Accumulated Home Sensor Data

    Publication Year: 2007 , Page(s): 12 - 18
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (984 KB) |  | HTML iconHTML  

    In this paper, we propose a method consists of two components, behavior patterns extraction and anomaly detection algorithm in daily life. To begin with, sensor data are accumulated in a room environment and behavior description labels are assigned for each data segment using HMM(hidden Markov model) and k-means method. An HMM is composed every day based on sensor data segments of the day. The behavior description label at each time segment is determined by likelihood of the segment computed using the HMM. In anomaly detection step, typical behavior sequences are acquired using probabilistic density of behavior occurrence and behavior successive time. Each probabilistic density is composed based on accumulating labeled- data using sequential discounting Laplace estimation and sequential discounting expectation and maximization algorithms. When a new datum comes, if typical behavior data change largely, the data is detected as anomaly. The proposed method is verified by a long-time activity detection sensor data taken at a house of elderly person. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search System for Behavior Time Segments from Accumulated Sensor Data in Room Environment

    Publication Year: 2007 , Page(s): 19 - 24
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1039 KB) |  | HTML iconHTML  

    This paper proposes a search system for a database that stores heterogeneous sensor data in home environment. In the system, sequential sensor data are treated as time segments. The time segments are generated with Flexible representation among programs for time segment generation, database table and tokens in query. Various search and aggregation of time segments about daily behavior (ex. average of sleeping time for every week and frequency of watching TV when sitting) are realized with the simple query language for generated time segments. We demonstrated the search system with a large amount of sensor data accumulated in our Sensing Room, which is a room including many heterogeneous sensors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active RFID-Based Object Management System in Sensor-Embedded Environment

    Publication Year: 2007 , Page(s): 25 - 30
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (752 KB) |  | HTML iconHTML  

    In this paper, we proposed the object location estimation method in sensor-embedded environment using active Radio Frequency Identification (RFID) technology. Based on the proposed method, we have developed the indoor object management system, which provides users with three main functionalities: the ability to access and manage targeted objects in the environment, real-timely monitor their locations, record and later search the particular information from historical database. The estimation of object's location is based on the analysis of RF signal strength retrieved from RFID system and position tracking of a person in the room using floor-distributed pressure sensors. The experiment result has shown that the integration of sensors significantly reduce the effects from external interferences in the analysis of RF signal strength, and improve the accuracy of object location sensing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree-Clustered Data Gathering Protocol (TCDGP) for Wireless Sensor Networks

    Publication Year: 2007 , Page(s): 31 - 36
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    Wireless Sensor Networks (WSNs) consists of plenty nodes which are low cost, low power consuming, small volume and short-transmitting. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways of utilizing limited energy of sensor node in order to give longer life time of WSNs. Therefore, how to reduce node's energy that is consumed in transmitting data has became a very important issue. From many kinds of paper, multi-hop routing protocol is well known for power saving in data gathering. Recently researches uses such types of the cluster-based (e.g., LEACH), the chain-based (e.g., PEGASIS) and the tree-based (e.g., TREEPSI) to establish their energy-efficient routing protocol. In this paper, we propose tree-clustered data gathering protocol (also called TCDGP) to improve the LEACH and TREEPSI. The novel proposed protocol can preserve both advantages and improve the power consumption further. Finally, simulation results show that our proposal has better performance than before. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Based Object Localization System Using Ceiling Cameras with Particle Filter

    Publication Year: 2007 , Page(s): 37 - 42
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (179 KB) |  | HTML iconHTML  

    In this paper, we propose an object localization method for home environments. This method utilizes RFID equipments, a mobile robot and some ceiling cameras. The RFID system estimates a rough position of each object. The autonomous robot with RFID antennas explores the environment so as to detect other objects on the floor. Each object that is attached an RFID tag, is then recognized by utilizing its feature information stored in this tag. Finally, the precise localization of each object is achieved by the ceiling cameras with particle filters. The accuracy and the robustness of the proposed method are verified through an experiment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Wireless Mesh Networking Architectures for Future Smart Homes

    Publication Year: 2007 , Page(s): 43 - 48
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    Future smart homes will create comfortable living environments which are embedded with a wide range of intelligent functionalities including home computing, entertainment, health care, and security. These place stringent requirements on the home networking architecture. In this paper, we propose a novel concept of Virtual Wireless Wire (Viwiwire), which is a set of consecutive high bandwidth wireless links over which concurrent transmission and reception can operate without interference. Based on this concept, a number of specific mesh networking architectures are proposed for future smart home networking. These include: wireless busline mesh, wireless ring mesh, and general multi-path mesh. The paper presents analyses that demonstrate the high performance of the proposed networking architectures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Design Tool of Context Aware System for Ubiquitous Healthcare Service in a Smart Home

    Publication Year: 2007 , Page(s): 49 - 54
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1101 KB) |  | HTML iconHTML  

    Recent developments of information technologies are leading the advent of the era of ubiquitous healthcare service, which means healthcare services at any time and at any places. In a home, the ubiquitous healthcare service requires some context aware system for smart services using home network. In this paper, we propose a systematic design tool of a context aware system for ubiquitous healthcare service in a smart home, which is composed of a home gateway, a home server, a PDA, home network healthcare devices, and wearable sensors. We developed a context aware framework to send information from wearable sensors or healthcare devices to healthcare service entities as a middleware to solve the interoperability problem among sensor makers and healthcare service providers. And, we propose a design tool of ubiquitous healthcare services with the context aware framework in a systematic way. In order to show the feasibility of the proposed system, an application example is given, which is applied to a self check service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimal Access Points Allocation Scheme Based on Genetic Algorithm

    Publication Year: 2007 , Page(s): 55 - 59
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    This paper presents an optimal access points allocation scheme based on genetic algorithm. The proposed allocation scheme provides a set of approximately efficient solutions that allows a wireless device user to choose a compromise access point regarding its capacity, not only regarding its signalling power or service set identifier. In the proposed scheme, all wireless device users can be serviced with optimal access points. In addition, the proposed scheme also considers a load balancing concept that prevents a specific access point to be a performance bottleneck and provides a reliable and high throughput service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Implementation Framework for Smart Home Telecare Services

    Publication Year: 2007 , Page(s): 60 - 65
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    Expected benefits of smart home telecare services do still depend on the capability to develop and validate systems which may foresee or react in an intelligent way to situations demanding specific support to patients, informal carers or authorized staff. Together with wireless sensor networks or broadband communication infrastructures at home, it is needed to create models and methods to solve how a smart home might think and act in identified home care contexts. This research work provides and implementation framework, supported by knowledge based techniques, that permits to design, develop and validate the description logic of a smart home telecare service. The framework includes an adapted methodology to sustain the knowledge acquisition process from users and experts as well as the creation and integration of ontologies in order to facilitate reasoning logic at ad hoc scenarios. The system was validated for a smart home telecare context supporting elderly fall episodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement

    Publication Year: 2007 , Page(s): 66 - 70
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    In the ubiquitous environments, smart cards as an ubiquitous computing device provide several services to pervasive computing and ubiquitous services. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. The current paper, however, demonstrates that Shieh-Wang's scheme does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems

    Publication Year: 2007 , Page(s): 71 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (69 KB) |  | HTML iconHTML  

    It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as SAML, XACML, Shibboleth, etc. However, their management efficiency could be further improved. The Role-based Access Control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. However, RBAC is still not flexible enough to address various application scenarios in ubiquitous systems. We propose a new architecture for access control in ubiquitous systems that impose attribute and status constraints on the RBAC model, which can significantly enhance the generality and flexibility of authorization by integrating the advantages of RBAC and attributed- based access control models. Moreover, the state mechanism proposed in this architecture captures the states of the authorization elements so as to reflect the outcomes of the authorization control. Finally, we analyze the flexibility and generality of this architecture in ubiquitous systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link Quality-Based CDS (LQ-CDS) Construction in Smart Home Wireless Mesh Networks

    Publication Year: 2007 , Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    Smart home wireless mesh networks (SH-WMNs) have emerged to become one of the promising applications of Wireless Sensor Networks (WSNs). In SH-WMNs, connected dominating set (CDS) is one of candidates for clustering formation or virtual backbone construction. During the CDS construction, however, the link that has enough bandwidth to support more end-devices should be selected in order to enhance overall network throughput and reliability. Our LQ-CDS construction scheme can improve the network performance via two metrics: interference metric and bandwidth metric. The simulation results show that LQ-CDS constructs the virtual backbone with the small subset ofDS and the link that has better bandwidth. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambient Lamp Display in the Active Home Ubiquitous Computing Environment for Relaxing and Mediation

    Publication Year: 2007 , Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (983 KB) |  | HTML iconHTML  

    This paper describes the design and implementation of Tea Place. Tea Place is an ambient lamp display placed above a tea table in the ActiveHome ubiquitous computing environment. This ambient display system is intended to enhance a traditional tea table with multimodal interfaces for user relaxation and mediation. It detects user context (such as the color of tea in a cup) and displays abstract animation images using LED array reflected on the surface of tea, ambient sounds and wind blowing. It makes users to concentrate on drinking and increasing their intimacy on the table at home. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Grocery Ordering Systems for Smart Home

    Publication Year: 2007 , Page(s): 87 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (348 KB) |  | HTML iconHTML  

    In this paper, we propose an automated grocery ordering system for smart home. We have developed a stationary policy to minimize the total grocery shopping cost. A mathematical model is developed and an efficient algorithm is provided to obtain the optimal parameters for the proposed policy. Finally, we extend our results to more general cases where the storage system is capacitated and the ordering cost is given by a decreasing stepwise function of order quantity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Intelligent Fitness Guide System in Context Aware Exercise Environment

    Publication Year: 2007 , Page(s): 93 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    To enhancing the exercise effect, exercise management systems are introduced and generally used. They create the proper exercise program through exercise prescription after determining the personal body status. But, exercise programs, are created at 2 weeks~3months intervals, are very static and can't respect with person's exercise habit or cycle that is dynamically changed. If exercise period is long, exercise effect will diminishing. This paper proposed context aware exercise environment (CAEE), provides an exercise program through recalculation of exercise prescription after user's situation awareness, and designs the CAEE as intelligent fitness guide (IFG) system. If exercise kinds, frequency and strength of user are changing, that system creates the exercise program through exercise optimization algorithm. As it (IFG) is providing the exercise program in a real time to users, it can be enabled the effective, stable exercise in user's physical body according to user situation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windows Pagefile Collection and Analysis for a Live Forensics Context

    Publication Year: 2007 , Page(s): 97 - 101
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (94 KB) |  | HTML iconHTML  

    The aim of this paper is to present a new tool, the Page-file Collection Tool (PCT), which can be used to obtain a pagefile on a live Windows based system. It is a known fact that a pagefile on a live system is protected by the operating system, which uses it in the virtual memory context. By using the NTFS filesystem specifications we were able to reconstruct the full pagefile, which can be used by a forensics expert to carve out further and precious information in the memory analysis field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence

    Publication Year: 2007 , Page(s): 102 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2940 KB) |  | HTML iconHTML  

    With the advancement of electronic information, digital forensics is becoming important for securing digital data as evidence. This trend is expected to grow in Future Generation Communication environments. Among digital forensics, the e-Discovery technology is becoming particularly important as a procedure for electronic evidence disclosure. At the disclosure of evidence, necessary electronic documents containing keywords specified by the plaintiff must always be disclosed. In many cases, however, secret or private information is kept confidential for protection (this is called "sanitizing"). If an electronic document with an ordinary digital signature is partially sanitized, the tampering of a non-sanitized section cannot be detected. In addition, keywords may be sanitized to avoid document submission. This paper proposes the e-Discovery system that allows both the sanitizing of disclosure information and the securing of evidence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Packet-level JPEG Forensic Data Collection

    Publication Year: 2007 , Page(s): 108 - 113
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (602 KB) |  | HTML iconHTML  

    Recently, multimedia transmission in the Internet is popular. Digital files are widespread. However, digital distribution may suffer problems including illegal duplication, piracy and pornographic inundation. To avoid disseminating unlawful JPEG images and to control the evidences of illegal distribution are important for digital forensic. In this paper, a novel digital feature retrieval mechanism for JPEG image files is proposed. The scheme could extract JPEG binary data on the fly at the packet level using a DC feature to search for suspicious files. According to the experiment results, our method could reduce the storage volume of JPEG image files and retrieve effective features quickly from the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.