Institute of Electronics, Information and Communication Engineers

Displaying 1-22 of 22 results

  • White Papers // Sep 2012

    Dynamic Resource Management in Clouds: A Probabilistic Approach

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this paper, the authors suggest a probabilistic...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2011

    Support Efficient and Fault-Tolerant Multicast in Bufferless Network-on-Chip

    In this paper, the authors propose three Deflection-Routing-based Multicast (DRM) schemes for a buffer-less NoC. The DRM scheme without packets replication (DRM noPR) sends multicast packet through a nondeterministic path. The DRM schemes with adaptive packets replication (DRM PR src and DRM PR all) replicate multicast packets at the source...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2011

    Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks

    WiMAX (IEEE 802.16) has emerged as a promising radio access technology for providing high speed broadband connectivity to subscribers over large geographic regions. New enhancements allow deployments of Relay Stations (RSs) that can extend the coverage of the Base Station (BS), increase cell capacity, or both. In this paper, the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Secret Key Agreement From Correlated Gaussian Sources by Rate Limited Public Communication

    The authors investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, they show a closed form expression of the optimal trade-off between the rate of key generation...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

    Recent Location Based Services (LBSs) extend not only information services such as car navigation services, but supporting various applications such as augmented reality and emergency services in ubiquitous computing environments. However location based services in the ubiquitous computing environment bring several security issues such as location privacy and forgery. While...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jan 2011

    An Improved TCP Friendly Rate Control Algorithm for Wireless Networks

    TCP Friendly Rate Control (TFRC) has been widely used in the Internet multimedia streaming applications. However, performance of traditional TFRC algorithm degrades significantly when deployed over wireless networks. Although numerous TFRC variants have been proposed to improve the performance of TFRC over wireless networks, designing a TFRC algorithm with graceful...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    A Transport-layer Solution for Alleviating TCP Unfairness in a Wireless LAN Environment

    Per-flow unfairness of TCP throughput in the IEEE 802.11 Wireless LAN (WLAN) environment has been reported in past literature. A number of researchers have proposed various methods for alleviating the unfairness; most require modification of MAC protocols or queue management mechanisms in access points. However, the MAC protocols of access...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    Vulnerability of MRD-Code-based Universal Secure Network Coding Against Stronger Eavesdroppers

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. The authors give a proof for...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2010

    Location-Aware and Privacy-Preserving Approach for Child-Care and Safety in Ubiquitous Computing Environment

    In this paper, the authors establish their system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, the authors propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks....

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Aug 2010

    Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems

    The systematic processes exactly define the development cycle and help the development team follow the same development strategies and techniques, thus allowing a continuous improvement in the quality of the developed products. Likewise, it is important that the development process used integrates security aspects from the first stages at the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2009

    An Enhanced Security Protocol for Fast Mobile IPv6

    Off late, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    EMC Investigations of Wireless Sensor Networks Within the Engine Room of Vessels

    This paper deals with wireless sensor networks within the engine room of vessels. At the engine room data like temperature, flow and pressure have to be measured. To replace cabling and to reduce costs a wireless sensor network is of interest. Therefore the special EMC environment within the engine room...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    The Specific Absorption Rate of Mobile Phones Measured in a Flat Phantom and in the Standardized Human Head Phantom

    The authors have investigated a simplification procedure of the Specific Absorption Rate (SAR) compliance test for mobile phones. In this paper, it is shown that maximum averaged SARs of a flat phantom and the SAM phantom are measured and compared for 38 mobile phones in the market in order to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    Attenuation and Scattering Characteristics of Microwaves over Forests for WiMAX Wireless Communications

    WiMAX wireless communication has been rapidly developed for broadband mobile communication including image transmission. To design excellent high performance mobile communication systems of very high speed transmission, accurate environment evaluation of communication systems is indispensable. In the past, building and street effects on high speed signal propagation have been studied...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2009

    Routing With Load-Balancing in Multi-Radio Wireless Mesh Networks

    This paper addresses the interference and load imbalance problems in multi-radio infrastructure mesh networks where each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. To provide backbone support, it is necessary to reduce interference and balance load in Wireless Mesh Networks...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2009

    Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality Vs. Theory

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11 Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5 Mbps of usable bandwidth. Considering this characteristic, this paper...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Dec 2008

    A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    The paper proposes an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2008

    Interference-Aware Transmission Power Control for Wireless Sensor Networks

    Maintaining the lowest possible transmission power in the Wireless Sensor Networks (WSNs) is vulnerable to the interference fluctuations because of the bad signal-to-Interference-Plus-Noise-Ratio (SINR). The previous Transmission Power Control (TPC) algorithms do not consider much for the interferences from other 2.4 GHz devices, which can cause significant performance degradations in...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2008

    DEMOCO: Energy-Efficient Detection and Monitoring for Continuous Objects InWireless Sensor Networks

    The proliferation of research on target detection and tracking in wireless sensor networks has kindled development of monitoring continuous objects such as fires and hazardous bio-chemical material diffusion. In this paper, the authors propose an energy-efficient algorithm that monitors a moving event region by selecting only a subset of nodes...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2008

    Interference Tolerant Power Control Algorithm of Ranging Process in IEEE 802.16 Relay System

    This paper considers the ranging process of IEEE 802.16 system in relay system. An interference problem between MS-BS ranging (i.e. ranging between mobile station and base station) and MS-RS ranging (i.e. ranging between mobile station and relay station), which is caused by the introduction of relay systems, is addressed. A...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2008

    Optical Broadcast-and-Select Network Architecture With Centralized Multi-Carrier Light Source

    The paper proposes an optical broadcast-and-select network architecture with Centralized Multi-Carrier Light Source (C-MCLS). It enables all network nodes access a large number of optical carriers in a cost-effective manner through dynamic optical broadcast and select. Cost analysis and numerical results show that it greatly reduces the light source cost...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2006

    Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows

    In this paper, the authors enhance the security of Tseng et al.'s scheme. The proposed scheme also can apply to the generalized scheme of Tseng et al.'s scheme. The proposed scheme not only satisfies requirements of Tseng et al.'s scheme and protects user's private data certainly, but also achieves the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2008

    Interference Tolerant Power Control Algorithm of Ranging Process in IEEE 802.16 Relay System

    This paper considers the ranging process of IEEE 802.16 system in relay system. An interference problem between MS-BS ranging (i.e. ranging between mobile station and base station) and MS-RS ranging (i.e. ranging between mobile station and relay station), which is caused by the introduction of relay systems, is addressed. A...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2009

    An Enhanced Security Protocol for Fast Mobile IPv6

    Off late, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2009

    Routing With Load-Balancing in Multi-Radio Wireless Mesh Networks

    This paper addresses the interference and load imbalance problems in multi-radio infrastructure mesh networks where each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. To provide backbone support, it is necessary to reduce interference and balance load in Wireless Mesh Networks...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2009

    Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality Vs. Theory

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11 Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5 Mbps of usable bandwidth. Considering this characteristic, this paper...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2008

    Optical Broadcast-and-Select Network Architecture With Centralized Multi-Carrier Light Source

    The paper proposes an optical broadcast-and-select network architecture with Centralized Multi-Carrier Light Source (C-MCLS). It enables all network nodes access a large number of optical carriers in a cost-effective manner through dynamic optical broadcast and select. Cost analysis and numerical results show that it greatly reduces the light source cost...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Dec 2008

    A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    The paper proposes an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    EMC Investigations of Wireless Sensor Networks Within the Engine Room of Vessels

    This paper deals with wireless sensor networks within the engine room of vessels. At the engine room data like temperature, flow and pressure have to be measured. To replace cabling and to reduce costs a wireless sensor network is of interest. Therefore the special EMC environment within the engine room...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2008

    Interference-Aware Transmission Power Control for Wireless Sensor Networks

    Maintaining the lowest possible transmission power in the Wireless Sensor Networks (WSNs) is vulnerable to the interference fluctuations because of the bad signal-to-Interference-Plus-Noise-Ratio (SINR). The previous Transmission Power Control (TPC) algorithms do not consider much for the interferences from other 2.4 GHz devices, which can cause significant performance degradations in...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Secret Key Agreement From Correlated Gaussian Sources by Rate Limited Public Communication

    The authors investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, they show a closed form expression of the optimal trade-off between the rate of key generation...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Mar 2011

    Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies

    Recent Location Based Services (LBSs) extend not only information services such as car navigation services, but supporting various applications such as augmented reality and emergency services in ubiquitous computing environments. However location based services in the ubiquitous computing environment bring several security issues such as location privacy and forgery. While...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Oct 2010

    Location-Aware and Privacy-Preserving Approach for Child-Care and Safety in Ubiquitous Computing Environment

    In this paper, the authors establish their system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, the authors propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks....

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2008

    DEMOCO: Energy-Efficient Detection and Monitoring for Continuous Objects InWireless Sensor Networks

    The proliferation of research on target detection and tracking in wireless sensor networks has kindled development of monitoring continuous objects such as fires and hazardous bio-chemical material diffusion. In this paper, the authors propose an energy-efficient algorithm that monitors a moving event region by selecting only a subset of nodes...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    The Specific Absorption Rate of Mobile Phones Measured in a Flat Phantom and in the Standardized Human Head Phantom

    The authors have investigated a simplification procedure of the Specific Absorption Rate (SAR) compliance test for mobile phones. In this paper, it is shown that maximum averaged SARs of a flat phantom and the SAM phantom are measured and compared for 38 mobile phones in the market in order to...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jul 2009

    Attenuation and Scattering Characteristics of Microwaves over Forests for WiMAX Wireless Communications

    WiMAX wireless communication has been rapidly developed for broadband mobile communication including image transmission. To design excellent high performance mobile communication systems of very high speed transmission, accurate environment evaluation of communication systems is indispensable. In the past, building and street effects on high speed signal propagation have been studied...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Jan 2011

    An Improved TCP Friendly Rate Control Algorithm for Wireless Networks

    TCP Friendly Rate Control (TFRC) has been widely used in the Internet multimedia streaming applications. However, performance of traditional TFRC algorithm degrades significantly when deployed over wireless networks. Although numerous TFRC variants have been proposed to improve the performance of TFRC over wireless networks, designing a TFRC algorithm with graceful...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2011

    Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks

    WiMAX (IEEE 802.16) has emerged as a promising radio access technology for providing high speed broadband connectivity to subscribers over large geographic regions. New enhancements allow deployments of Relay Stations (RSs) that can extend the coverage of the Base Station (BS), increase cell capacity, or both. In this paper, the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2011

    Support Efficient and Fault-Tolerant Multicast in Bufferless Network-on-Chip

    In this paper, the authors propose three Deflection-Routing-based Multicast (DRM) schemes for a buffer-less NoC. The DRM scheme without packets replication (DRM noPR) sends multicast packet through a nondeterministic path. The DRM schemes with adaptive packets replication (DRM PR src and DRM PR all) replicate multicast packets at the source...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    A Transport-layer Solution for Alleviating TCP Unfairness in a Wireless LAN Environment

    Per-flow unfairness of TCP throughput in the IEEE 802.11 Wireless LAN (WLAN) environment has been reported in past literature. A number of researchers have proposed various methods for alleviating the unfairness; most require modification of MAC protocols or queue management mechanisms in access points. However, the MAC protocols of access...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Nov 2010

    Vulnerability of MRD-Code-based Universal Secure Network Coding Against Stronger Eavesdroppers

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. The authors give a proof for...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Sep 2012

    Dynamic Resource Management in Clouds: A Probabilistic Approach

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this paper, the authors suggest a probabilistic...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Aug 2010

    Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid systems

    The systematic processes exactly define the development cycle and help the development team follow the same development strategies and techniques, thus allowing a continuous improvement in the quality of the developed products. Likewise, it is important that the development process used integrates security aspects from the first stages at the...

    Provided By Institute of Electronics, Information and Communication Engineers

  • White Papers // Apr 2006

    Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows

    In this paper, the authors enhance the security of Tseng et al.'s scheme. The proposed scheme also can apply to the generalized scheme of Tseng et al.'s scheme. The proposed scheme not only satisfies requirements of Tseng et al.'s scheme and protects user's private data certainly, but also achieves the...

    Provided By Institute of Electronics, Information and Communication Engineers