Catálogo de publicaciones - libros
Managing Next Generation Networks and Services: 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Proceedings
Shingo Ata ; Choong Seon Hong (eds.)
En conferencia: 10º Asia-Pacific Network Operations and Management Symposium (APNOMS) . Sapporo, Japan . October 10, 2007 - October 12, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-75475-6
ISBN electrónico
978-3-540-75476-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment
Seon-Ho Park; Joon-Sic Cho; Sung-Min Jung; Young-Ju Han; Tai-Myoung Chung
The smart home technology is a noticeable area of study in various studies on the ubiquitous computing technology. This paper presents the security management system to provide context-aware security service. The system supports the management and enforcement of context-aware security and the management of the context of users and resources. This system provides the security service functions such as the partial credential based user authentication and context-aware access control, and the security policy management functions. In addition, the system provides the policy enforcement simulation function to test and validate the security policy. This simulator can cover all security service in the smart home environment.
- Session 3: Network Security Management I | Pp. 102-111
Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks
Frank Chiang; Robin Braun
Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be exploited to compromise the normal functions, such as service deployment, file system access permissions, applications activations and so on. Autonomic Communication Networks (ACNs) are recently proposed as business-objective driven high-level self-managed telecommunication networks with the adaptation capability to cope with increasing dynamics. Adaptation capability termed as adaptability becomes the premise of realizing thorough autonomy. As a theoretic foundation, we firstly propose an innovative Object-oriented Management Information Base (O:MIB). Secondly, a new information-theoretic security awareness strategy inspired from human immune system is proposed to reconfigure file access right, which has a direct relation with adaptability. The experimental results validate this methodology and find out a statistical bound for operators to set a vulnerability level of warning in practice.
- Session 3: Network Security Management I | Pp. 112-122
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
Jongpil Jeong; Min Young Chung; Hyunseung Choo
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users identification who uses home devices. Several techniques such as biometrics, password, certificate, and smart card can be used for user authentication in the same environments. However, such user authentication techniques must be examined before being employed in the environment where home devices have low efficiency and performance. Here, we present the important security functions of home networks. The proposed authentication protocol is designed to accept the existing home networks based on one-time password protocol. Also, it is well suited solution and is quite satisfactory in terms of home networks security requirements, because of requiring low computation that performs simple operations using one-way hash functions. Our proposed scheme can protect illegal access for home services and devices and it does not allow unnecessary service access although they are legitimate users. Therefore, it allows the user to provide real-time privilege control and good implementation for secure home networks.
- Session 3: Network Security Management I | Pp. 123-133
New Access Control on DACS Scheme
Kazuya Odagiri; Nao Tanoue; Rihito Yaegashi; Masaharu Tadauchi; Naohiro Ishii
Recently, social interest about network security becomes very high including the issue of information leak through a network. As one of the important technologies about network security, there is an access control for network service. There are some methods of access control: access control by packet filtering mechanism on the server side, access control by the communication control mechanism on the network course such as SSL-VPN, and access control by packet filtering mechanism on the server side such as personal firewall of quarantine network. In this paper, new access control is realized. This new access control is realized as the result of combining the above two methods and improving each other’s problems.
- Session 3: Network Security Management I | Pp. 134-143
Design and Analysis of Hybrid On-Demand Multipath Routing Protocol with Multimedia Application on MANETs
Chuan-Ching Sue; Chi-Yu Hsu; Yi-Cheng Lin
AODV and DSR are the two most widely studied on-demand ad hoc routing protocols because of their low routing overheads. However, previous studies have identified various limitations of these protocols. For example, whenever a link break occurs on the active route, they must both invoke a route discovery process. In general, on-demand protocols use query floods to discover routes. Such floods consume a substantial portion of the network bandwidth. To alleviate these problems, this study proposed an On-demand Hybrid Multipath Routing (OHMR) which extends AODV by equipping it with the capability to discover multiple routing paths. OHMR features two novel characteristics; it establishes multiple node-disjointed and braided routing paths between a source-destination pair and it reduces the frequency of route discoveries. The present results demonstrate that OHMR for multimedia communication can improve the performance of the fraction of decodable frames and achieve better performance in terms of video quality than the traditional node-disjoint multipath.
- Session 4: Sensor and Ad-hoc Networks | Pp. 144-154
A Routing Scheme for Supporting Network Mobility of Sensor Network Based on 6LoWPAN
Jin Ho Kim; Choong Seon Hong; Koji Okamura
Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to be vital for the future ubiquitous environment. It can maximize the ripple effect of ubiquitous revolution due to the close correlation between NEMO and 6LoWPAN. In this paper, we propose an interoperable architecture between NEMO and 6LoWPAN. To accomplish our goal we have enhanced the routing protocol: An extended routing scheme for mobile routers to support mobility in 6LoWPAN sensor nodes. Enhanced routing scheme performs default gateway discovery and mobile network prefix discovery operations for packet forwarding, path optimization and backup route maintenance. Simulation shows that our mechanism is capable of minimizing the routing overheads, and end-to-end packet delay.
- Session 4: Sensor and Ad-hoc Networks | Pp. 155-164
Cross Layer Based PBNM for Mobile Ad Hoc Networks with Vector Information in XML
Shafqat-ur Rehman; Wang-Cheol Song; Gyung-Leen Park; Junghoon Lee
Management of mobile ad hoc networks poses new challenges due to the dynamic nature of the networks and the environment in which they operate. Management of these networks requires distributed systems which can adapt to the changing network conditions. An interesting approach to network management is Policy based Network Management (PBNM) which configures and controls the network as a whole. Lately, PBNM has become very popular but it has been mainly focused on large fixed networks and it is still evolving in the arena of mobile ad hoc networks. We present a PBNM framework utilizing the xml based cross-layer feed back. We propose solutions at the network layer, a cross layer feedback architecture and policy based management mechanism at the application layer. We also present initial analysis via ns2 simulations.
- Session 4: Sensor and Ad-hoc Networks | Pp. 165-174
FECP Protocol for Energy Balanced Data Propagation in Smart Home Sensor Networks
Bao Nguyen Nguyen; Deokjai Choi
Nowadays Smart Home seems to be getting popular. An essential element of Smart Home is its sensor network to convey environment information to the control station. There have been many communication protocols for this sensor network. A problem from previous protocols is unbalanced energy consumption among sensor nodes. Even though they tried to overcome unbalanced energy consumption, they could not solve this problem completely yet. In this paper, we found that the basic reason for this unbalanced energy consumption is that there is normally one base node. Because of this architectural problem, the nodes around this sink node lose their energy more easily in relevance to other nodes. So, we propose the sensor network model with 2 and only 2 base stations with simulations, and its corresponding communication protocol.
- Session 4: Sensor and Ad-hoc Networks | Pp. 175-184
Real-Time Multicast Network Monitoring
Joohee Kim; Bongki Kim; Jaehyoung Yoo
Through IP multicast has been deployed for more than a decade, several tools and systems for managing multicast network and service are developed. Most of them have their special propose to perform their tasks. That’s not so comprehensive and easy-to-use customer-centric system. Especially today with the growth of multimedia service needs based on IP multicast such as IP-TV, it’s more important to monitor and manage the network at real-time. In this paper, we present our multicast network management system ’Multicast NMS’ we have built, aimed to monitor and manage our network for IP-TV service application delivery. we describe the design and implementing and experiences.
- Session 4: Sensor and Ad-hoc Networks | Pp. 185-194
Monitoring SIP Service Availability in IPv4/IPv6 Hybrid Networks
Yung-Chang Wong; Rhoda Chen
With the increasing deployment of IPv6, IPv6-based SIP applications draw more attention from service providers. To date, most work on SIP operations and management (OAM) is undertaken on IPv4 networks. In this paper we present a framework called MoSA for monitoring SIP service availability in heterogeneous IPv4/IPv6 networks. We also investigate the fault tolerance issue of our approach analytically. A prototype has been implemented in Providence University for validation.
- Session 4: Sensor and Ad-hoc Networks | Pp. 195-204