Catálogo de publicaciones - libros

Compartir en
redes sociales


Managing Next Generation Networks and Services: 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Proceedings

Shingo Ata ; Choong Seon Hong (eds.)

En conferencia: 10º Asia-Pacific Network Operations and Management Symposium (APNOMS) . Sapporo, Japan . October 10, 2007 - October 12, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-75475-6

ISBN electrónico

978-3-540-75476-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment

Seon-Ho Park; Joon-Sic Cho; Sung-Min Jung; Young-Ju Han; Tai-Myoung Chung

The smart home technology is a noticeable area of study in various studies on the ubiquitous computing technology. This paper presents the security management system to provide context-aware security service. The system supports the management and enforcement of context-aware security and the management of the context of users and resources. This system provides the security service functions such as the partial credential based user authentication and context-aware access control, and the security policy management functions. In addition, the system provides the policy enforcement simulation function to test and validate the security policy. This simulator can cover all security service in the smart home environment.

- Session 3: Network Security Management I | Pp. 102-111

Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks

Frank Chiang; Robin Braun

Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such as service deployment, file system access permissions, applications activations and so on. Autonomic Communication Networks (ACNs) are recently proposed as business-objective driven high-level self-managed telecommunication networks with the adaptation capability to cope with increasing dynamics. Adaptation capability termed as adaptability becomes the premise of realizing thorough autonomy. As a theoretic foundation, we firstly propose an innovative Object-oriented Management Information Base (O:MIB). Secondly, a new information-theoretic security awareness strategy inspired from human immune system is proposed to reconfigure file access right, which has a direct relation with adaptability. The experimental results validate this methodology and find out a statistical bound for operators to set a vulnerability level of warning in practice.

- Session 3: Network Security Management I | Pp. 112-122

Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks

Jongpil Jeong; Min Young Chung; Hyunseung Choo

In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users identification who uses home devices. Several techniques such as biometrics, password, certificate, and smart card can be used for user authentication in the same environments. However, such user authentication techniques must be examined before being employed in the environment where home devices have low efficiency and performance. Here, we present the important security functions of home networks. The proposed authentication protocol is designed to accept the existing home networks based on one-time password protocol. Also, it is well suited solution and is quite satisfactory in terms of home networks security requirements, because of requiring low computation that performs simple operations using one-way hash functions. Our proposed scheme can protect illegal access for home services and devices and it does not allow unnecessary service access although they are legitimate users. Therefore, it allows the user to provide real-time privilege control and good implementation for secure home networks.

- Session 3: Network Security Management I | Pp. 123-133

New Access Control on DACS Scheme

Kazuya Odagiri; Nao Tanoue; Rihito Yaegashi; Masaharu Tadauchi; Naohiro Ishii

Recently, social interest about network security becomes very high including the issue of information leak through a network. As one of the important technologies about network security, there is an access control for network service. There are some methods of access control: access control by packet filtering mechanism on the server side, access control by the communication control mechanism on the network course such as SSL-VPN, and access control by packet filtering mechanism on the server side such as personal firewall of quarantine network. In this paper, new access control is realized. This new access control is realized as the result of combining the above two methods and improving each other’s problems.

- Session 3: Network Security Management I | Pp. 134-143

Design and Analysis of Hybrid On-Demand Multipath Routing Protocol with Multimedia Application on MANETs

Chuan-Ching Sue; Chi-Yu Hsu; Yi-Cheng Lin

AODV and DSR are the two most widely studied on-demand ad hoc routing protocols because of their low routing overheads. However, previous studies have identified various limitations of these protocols. For example, whenever a link break occurs on the active route, they must both invoke a route discovery process. In general, on-demand protocols use query floods to discover routes. Such floods consume a substantial portion of the network bandwidth. To alleviate these problems, this study proposed an On-demand Hybrid Multipath Routing (OHMR) which extends AODV by equipping it with the capability to discover multiple routing paths. OHMR features two novel characteristics; it establishes multiple node-disjointed and braided routing paths between a source-destination pair and it reduces the frequency of route discoveries. The present results demonstrate that OHMR for multimedia communication can improve the performance of the fraction of decodable frames and achieve better performance in terms of video quality than the traditional node-disjoint multipath.

- Session 4: Sensor and Ad-hoc Networks | Pp. 144-154

A Routing Scheme for Supporting Network Mobility of Sensor Network Based on 6LoWPAN

Jin Ho Kim; Choong Seon Hong; Koji Okamura

Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to be vital for the future ubiquitous environment. It can maximize the ripple effect of ubiquitous revolution due to the close correlation between NEMO and 6LoWPAN. In this paper, we propose an interoperable architecture between NEMO and 6LoWPAN. To accomplish our goal we have enhanced the routing protocol: An extended routing scheme for mobile routers to support mobility in 6LoWPAN sensor nodes. Enhanced routing scheme performs default gateway discovery and mobile network prefix discovery operations for packet forwarding, path optimization and backup route maintenance. Simulation shows that our mechanism is capable of minimizing the routing overheads, and end-to-end packet delay.

- Session 4: Sensor and Ad-hoc Networks | Pp. 155-164

Cross Layer Based PBNM for Mobile Ad Hoc Networks with Vector Information in XML

Shafqat-ur Rehman; Wang-Cheol Song; Gyung-Leen Park; Junghoon Lee

Management of mobile ad hoc networks poses new challenges due to the dynamic nature of the networks and the environment in which they operate. Management of these networks requires distributed systems which can adapt to the changing network conditions. An interesting approach to network management is Policy based Network Management (PBNM) which configures and controls the network as a whole. Lately, PBNM has become very popular but it has been mainly focused on large fixed networks and it is still evolving in the arena of mobile ad hoc networks. We present a PBNM framework utilizing the xml based cross-layer feed back. We propose solutions at the network layer, a cross layer feedback architecture and policy based management mechanism at the application layer. We also present initial analysis via ns2 simulations.

- Session 4: Sensor and Ad-hoc Networks | Pp. 165-174

FECP Protocol for Energy Balanced Data Propagation in Smart Home Sensor Networks

Bao Nguyen Nguyen; Deokjai Choi

Nowadays Smart Home seems to be getting popular. An essential element of Smart Home is its sensor network to convey environment information to the control station. There have been many communication protocols for this sensor network. A problem from previous protocols is unbalanced energy consumption among sensor nodes. Even though they tried to overcome unbalanced energy consumption, they could not solve this problem completely yet. In this paper, we found that the basic reason for this unbalanced energy consumption is that there is normally one base node. Because of this architectural problem, the nodes around this sink node lose their energy more easily in relevance to other nodes. So, we propose the sensor network model with 2 and only 2 base stations with simulations, and its corresponding communication protocol.

- Session 4: Sensor and Ad-hoc Networks | Pp. 175-184

Real-Time Multicast Network Monitoring

Joohee Kim; Bongki Kim; Jaehyoung Yoo

Through IP multicast has been deployed for more than a decade, several tools and systems for managing multicast network and service are developed. Most of them have their special propose to perform their tasks. That’s not so comprehensive and easy-to-use customer-centric system. Especially today with the growth of multimedia service needs based on IP multicast such as IP-TV, it’s more important to monitor and manage the network at real-time. In this paper, we present our multicast network management system ’Multicast NMS’ we have built, aimed to monitor and manage our network for IP-TV service application delivery. we describe the design and implementing and experiences.

- Session 4: Sensor and Ad-hoc Networks | Pp. 185-194

Monitoring SIP Service Availability in IPv4/IPv6 Hybrid Networks

Yung-Chang Wong; Rhoda Chen

With the increasing deployment of IPv6, IPv6-based SIP applications draw more attention from service providers. To date, most work on SIP operations and management (OAM) is undertaken on IPv4 networks. In this paper we present a framework called MoSA for monitoring SIP service availability in heterogeneous IPv4/IPv6 networks. We also investigate the fault tolerance issue of our approach analytically. A prototype has been implemented in Providence University for validation.

- Session 4: Sensor and Ad-hoc Networks | Pp. 195-204