Institute of Electronics, Information and Communication Engineers

Displaying 1-17 of 17 results

  • White Papers // Sep 2012

    Dynamic Resource Management in Clouds: A Probabilistic Approach

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this paper, the authors suggest a probabilistic...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2011

    Support Efficient and Fault-Tolerant Multicast in Bufferless Network-on-Chip

    In this paper, the authors propose three Deflection-Routing-based Multicast (DRM) schemes for a buffer-less NoC. The DRM scheme without packets replication (DRM noPR) sends multicast packet through a nondeterministic path. The DRM schemes with adaptive packets replication (DRM PR src and DRM PR all) replicate multicast packets at the source...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2011

    Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks

    WiMAX (IEEE 802.16) has emerged as a promising radio access technology for providing high speed broadband connectivity to subscribers over large geographic regions. New enhancements allow deployments of Relay Stations (RSs) that can extend the coverage of the Base Station (BS), increase cell capacity, or both. In this paper, the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Secret Key Agreement From Correlated Gaussian Sources by Rate Limited Public Communication

    The authors investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, they show a closed form expression of the optimal trade-off between the rate of key generation...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

    Recent Location Based Services (LBSs) extend not only information services such as car navigation services, but supporting various applications such as augmented reality and emergency services in ubiquitous computing environments. However location based services in the ubiquitous computing environment bring several security issues such as location privacy and forgery. While...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jan 2011

    An Improved TCP Friendly Rate Control Algorithm for Wireless Networks

    TCP Friendly Rate Control (TFRC) has been widely used in the Internet multimedia streaming applications. However, performance of traditional TFRC algorithm degrades significantly when deployed over wireless networks. Although numerous TFRC variants have been proposed to improve the performance of TFRC over wireless networks, designing a TFRC algorithm with graceful...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    A Transport-layer Solution for Alleviating TCP Unfairness in a Wireless LAN Environment

    Per-flow unfairness of TCP throughput in the IEEE 802.11 Wireless LAN (WLAN) environment has been reported in past literature. A number of researchers have proposed various methods for alleviating the unfairness; most require modification of MAC protocols or queue management mechanisms in access points. However, the MAC protocols of access...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    Vulnerability of MRD-Code-based Universal Secure Network Coding Against Stronger Eavesdroppers

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. The authors give a proof for...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2010

    Location-Aware and Privacy-Preserving Approach for Child-Care and Safety in Ubiquitous Computing Environment

    In this paper, the authors establish their system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, the authors propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks....

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Aug 2010

    Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems

    The systematic processes exactly define the development cycle and help the development team follow the same development strategies and techniques, thus allowing a continuous improvement in the quality of the developed products. Likewise, it is important that the development process used integrates security aspects from the first stages at the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2009

    An Enhanced Security Protocol for Fast Mobile IPv6

    Off late, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    EMC Investigations of Wireless Sensor Networks Within the Engine Room of Vessels

    This paper deals with wireless sensor networks within the engine room of vessels. At the engine room data like temperature, flow and pressure have to be measured. To replace cabling and to reduce costs a wireless sensor network is of interest. Therefore the special EMC environment within the engine room...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    The Specific Absorption Rate of Mobile Phones Measured in a Flat Phantom and in the Standardized Human Head Phantom

    The authors have investigated a simplification procedure of the Specific Absorption Rate (SAR) compliance test for mobile phones. In this paper, it is shown that maximum averaged SARs of a flat phantom and the SAM phantom are measured and compared for 38 mobile phones in the market in order to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    Attenuation and Scattering Characteristics of Microwaves over Forests for WiMAX Wireless Communications

    WiMAX wireless communication has been rapidly developed for broadband mobile communication including image transmission. To design excellent high performance mobile communication systems of very high speed transmission, accurate environment evaluation of communication systems is indispensable. In the past, building and street effects on high speed signal propagation have been studied...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Dec 2008

    A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    The paper proposes an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2006

    Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows

    In this paper, the authors enhance the security of Tseng et al.'s scheme. The proposed scheme also can apply to the generalized scheme of Tseng et al.'s scheme. The proposed scheme not only satisfies requirements of Tseng et al.'s scheme and protects user's private data certainly, but also achieves the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2006

    DSRED: A New Queue Management Scheme for the Next Generation Internet

    Random Early Detection (RED), an active queue management scheme, has been recommended by the Internet Engineering Task Force (IETF) for the next generation routers. RED suffers from a number of performance problems, such as low throughput, large delay/jitter, and induces instability in networks. Many of the previous attempts to improve...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    EMC Investigations of Wireless Sensor Networks Within the Engine Room of Vessels

    This paper deals with wireless sensor networks within the engine room of vessels. At the engine room data like temperature, flow and pressure have to be measured. To replace cabling and to reduce costs a wireless sensor network is of interest. Therefore the special EMC environment within the engine room...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Secret Key Agreement From Correlated Gaussian Sources by Rate Limited Public Communication

    The authors investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, they show a closed form expression of the optimal trade-off between the rate of key generation...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

    Recent Location Based Services (LBSs) extend not only information services such as car navigation services, but supporting various applications such as augmented reality and emergency services in ubiquitous computing environments. However location based services in the ubiquitous computing environment bring several security issues such as location privacy and forgery. While...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2010

    Location-Aware and Privacy-Preserving Approach for Child-Care and Safety in Ubiquitous Computing Environment

    In this paper, the authors establish their system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, the authors propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks....

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    The Specific Absorption Rate of Mobile Phones Measured in a Flat Phantom and in the Standardized Human Head Phantom

    The authors have investigated a simplification procedure of the Specific Absorption Rate (SAR) compliance test for mobile phones. In this paper, it is shown that maximum averaged SARs of a flat phantom and the SAM phantom are measured and compared for 38 mobile phones in the market in order to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    Attenuation and Scattering Characteristics of Microwaves over Forests for WiMAX Wireless Communications

    WiMAX wireless communication has been rapidly developed for broadband mobile communication including image transmission. To design excellent high performance mobile communication systems of very high speed transmission, accurate environment evaluation of communication systems is indispensable. In the past, building and street effects on high speed signal propagation have been studied...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2009

    An Enhanced Security Protocol for Fast Mobile IPv6

    Off late, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Dec 2008

    A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    The paper proposes an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2006

    DSRED: A New Queue Management Scheme for the Next Generation Internet

    Random Early Detection (RED), an active queue management scheme, has been recommended by the Internet Engineering Task Force (IETF) for the next generation routers. RED suffers from a number of performance problems, such as low throughput, large delay/jitter, and induces instability in networks. Many of the previous attempts to improve...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Aug 2010

    Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems

    The systematic processes exactly define the development cycle and help the development team follow the same development strategies and techniques, thus allowing a continuous improvement in the quality of the developed products. Likewise, it is important that the development process used integrates security aspects from the first stages at the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Sep 2012

    Dynamic Resource Management in Clouds: A Probabilistic Approach

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this paper, the authors suggest a probabilistic...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2011

    Support Efficient and Fault-Tolerant Multicast in Bufferless Network-on-Chip

    In this paper, the authors propose three Deflection-Routing-based Multicast (DRM) schemes for a buffer-less NoC. The DRM scheme without packets replication (DRM noPR) sends multicast packet through a nondeterministic path. The DRM schemes with adaptive packets replication (DRM PR src and DRM PR all) replicate multicast packets at the source...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jan 2011

    An Improved TCP Friendly Rate Control Algorithm for Wireless Networks

    TCP Friendly Rate Control (TFRC) has been widely used in the Internet multimedia streaming applications. However, performance of traditional TFRC algorithm degrades significantly when deployed over wireless networks. Although numerous TFRC variants have been proposed to improve the performance of TFRC over wireless networks, designing a TFRC algorithm with graceful...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2011

    Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks

    WiMAX (IEEE 802.16) has emerged as a promising radio access technology for providing high speed broadband connectivity to subscribers over large geographic regions. New enhancements allow deployments of Relay Stations (RSs) that can extend the coverage of the Base Station (BS), increase cell capacity, or both. In this paper, the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    A Transport-layer Solution for Alleviating TCP Unfairness in a Wireless LAN Environment

    Per-flow unfairness of TCP throughput in the IEEE 802.11 Wireless LAN (WLAN) environment has been reported in past literature. A number of researchers have proposed various methods for alleviating the unfairness; most require modification of MAC protocols or queue management mechanisms in access points. However, the MAC protocols of access...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2006

    Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows

    In this paper, the authors enhance the security of Tseng et al.'s scheme. The proposed scheme also can apply to the generalized scheme of Tseng et al.'s scheme. The proposed scheme not only satisfies requirements of Tseng et al.'s scheme and protects user's private data certainly, but also achieves the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    Vulnerability of MRD-Code-based Universal Secure Network Coding Against Stronger Eavesdroppers

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. The authors give a proof for...

    Provided By Institute of Electronics, Information and Communication Engineers