By Topic

2007 9th IFIP International Conference on Mobile Wireless Communications Networks

19-21 Sept. 2007

Filter Results

Displaying Results 1 - 25 of 48
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1846 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2007, Page(s): I
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Proceedings of the 9th international conference on mobile and wireless communications networks

    Publication Year: 2007, Page(s): II
    Request permission for commercial reuse | PDF file iconPDF (387 KB)
    Freely Available from IEEE
  • [Copyright and reprint permission]

    Publication Year: 2007, Page(s): III
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (430 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (145 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • MWCN 2007 organizers

    Publication Year: 2007, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • MWCN 2007 technical program schedule

    Publication Year: 2007, Page(s):viii - xiii
    Request permission for commercial reuse | PDF file iconPDF (1490 KB)
    Freely Available from IEEE
  • Information intensive wireless sensor networks: Challenges and solutions

    Publication Year: 2007, Page(s):xiv - xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Tremendous advancements in embedded systems, sensors and wireless communications technology have made it possible to build large-scale wireless sensor networks (WSNs). Due to their potential applications, WSNs have attracted significant attention to the industry, academic, and government organizations. In particular, by commanding a large number of distributed and coordinated sensor nodes, WSNs ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipath extensions to the DYMO routing protocol

    Publication Year: 2007, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1189 KB) | HTML iconHTML

    Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Peer-to-Peer content discovery over wireless mobile ad hoc networks

    Publication Year: 2007, Page(s):6 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1988 KB) | HTML iconHTML

    Peer-to-Peer (P2P) networks are frequenlty used for data sharing over mobile ad hoc networks (MANETs) due to their decentralization and high tolerance to failures. However, P2P networks do not perform well on MANETs. Structured P2P networks have a high level of unsuccessful queries due to the message drops, while unstructured networks saturate quickly due to the high number of messages sent. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of the capacity of wireless networks by optimizing communication distance

    Publication Year: 2007, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1479 KB) | HTML iconHTML

    As the number of nodes increases, the capacity of ad-hoc wireless networks is constrained by radio interference. Especially when a source node cannot directly communicate with its destination node, every packet has to travel through one or more intermediate nodes. The throughput decreases as the number of relayed hop count increases. To effectively use the limited radio resources, we propose a sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of position-based routing approaches in VANETS

    Publication Year: 2007, Page(s):16 - 20
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1773 KB) | HTML iconHTML

    This article presents a performance analysis between two location-based routing protocols: SIFT (SImple Forwarding over Trajectory), a novel, scalable, spatial-aware, trajectory-based approach, and DREAM (Distance Routing Effect Algorithm for Mobility), a stable, largely tested position-based scheme. The study was accomplished under a realistic urban mobility model for VANETS (Vehicular Ad hoc NET... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-Motes Bins: A real time application for enviromental monitoring in Wireless Sensor Networks

    Publication Year: 2007, Page(s):21 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2474 KB) | HTML iconHTML

    In-Motes Bins is an agent based real time In-Motes application developed for sensing light and temperature variations in an environment. In-Motes is a mobile agent middleware that facilitates the rapid deployment of adaptive applications in wireless sensor networks (WSNpsilas). In-Motes Bins is based on the injection of mobile agents into the WSN that can migrate or clone following specific rules ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application-quality-based mobility management scheme

    Publication Year: 2007, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1717 KB) | HTML iconHTML

    Experimental results are presented for end-point controlled handover of a stream of voice-like packet data traffic between two independent wireless networks. The handover was achieved by using a version of the stream control transmission protocol (SCTP) that had been modified to monitor link quality and switch the primary connection to the ldquobestrdquo quality link available, where quality is ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient data transport protocol for Event-Driven Field-Estimation on sensor networks

    Publication Year: 2007, Page(s):31 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1566 KB) | HTML iconHTML

    This paper introduces and analyzes an event-driven field-estimation (EDFE) protocol for wireless sensor networks. In our field estimation scheme the sensors derive their own notion of expected reading. Readings differing from the expected are considered events of interest and trigger a data transmission to the sink. The proposed protocol allows sensor nodes to only transmit the events of interest,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized anti-collision techniques in RFID systems

    Publication Year: 2007, Page(s):36 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1298 KB) | HTML iconHTML

    RFID systems are widely used in many diverse applications at present. A development of anti-collision technique is one of the most important issues for tag identification. In this paper we present an analysis for computing the optimal parameter for tag-collision resolution problem based on the EPCglobal RFID protocol [6]. A Q parameter, which controls the identification process, is assigned to tag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Token-based solution to secure PARTY protocol for self - organized networks

    Publication Year: 2007, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1647 KB) | HTML iconHTML

    Security is an important feature to be considered for successfully deployment of PARTY protocol. In this paper, firstly, we will identify a variety of attacks that could affect and disturb network functionality. Without any authentication mechanism and incentive for cooperation, network performance can be severely degraded. Here we propose a preventive and corrective mechanism based in the token s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic identity based solution for fast handover on EAP wireless networks

    Publication Year: 2007, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1543 KB) | HTML iconHTML

    In this paper we present a solution for providing a fast handover in wireless networks which involve network access control based on the Extensible Authentication Protocol. We propose an approach based on cryptographically generated identities, which reduces the number of round trips during authentication phase and achieves the objective of reducing the impact on existing EAP ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous key management protocol for secure group communications in MANETS

    Publication Year: 2007, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1254 KB) | HTML iconHTML

    A mobile ad hoc network (MANET) is an architecture without fixed infrastructure or centralized administration. However, when a message is transmitted in a multicast group, without any security infrastructure, it may be attacked or corrupted. In this paper we propose a new key management mechanism to support secure group multicast communications in ad hoc networks. The scheme proposes a dynamic con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile multimedia broadcasting vulnerability threats, attacks and security solutions

    Publication Year: 2007, Page(s):56 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2226 KB) | HTML iconHTML

    The IP Multimedia Subsystem (IMS) has emerged as next generation value added communication services including mobile multimedia broadcasting, multimedia conferencing, push to talk and presence etc on top of all IP networks. Offering multimedia streaming services across heterogeneous fixed and mobile networks have faced many challenges e.g. security, QoS, mobility and services management. In this a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service flows aware radio resource allocation in IEEE 802.16e networks

    Publication Year: 2007, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1374 KB) | HTML iconHTML

    In this paper we study the traditional resource allocation model in IEEE802.16e (mobile WiMax) and propose two algorithms for scheduling and mapping higher layer data into the basic resource allocation units (slots) of OFDMA frames in IEEE802.16e. Both scheduling and mapping approaches are based on the quality of service requirements of each service flow in terms of data rate and bit error rate (B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of dynamic policy-based flow redirection for multihomed mobile networks

    Publication Year: 2007, Page(s):66 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2106 KB) | HTML iconHTML

    This paper presents the design, implementation and evaluation of a solution for dynamic redirection of traffic flows for multihomed mobile networks. The solution was developed for a mobile user that disposes of a Personal Area Network (PAN) with a Personal Mobile Router (PMR), in order to achieve Always Best Connected (ABC) service by distributing flows belonging to different applications among th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • nSCTP: A new transport layer tunnelling approach to provide seamless handover for moving networks

    Publication Year: 2007, Page(s):71 - 75
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2098 KB) | HTML iconHTML

    In this paper, we propose a transport layer tunnelling for improving the seamless handover for group mobility. Efficiency of this protocol in reducing the handover latency, increasing the end-to-end throughput in wireless access networks with frequent handovers has been considered. We show that the new scheme could significantly increase the throughput particularly when the mobile networks roam fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.