New Publications are available for Computer networks and techniques
http://dl-live.theiet.org
New Publications are available now online for this publication.
Please follow the links to view the publication.Wideband HF over-the-air test results for ARQ and networking applications
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0384
This paper begins with a brief overview of HF data transport requirements leading to waveform design and interoperability considerations for the expanded bandwidths provided with MIL-STD-188-110C Appendix D Wideband HF (WBHF). Over-the-air (OTA) performance test results of the WBHF suite of data waveforms, focusing upon shorter data bursts used in Automatic Repeat-Request (ARQ) and networking applications. Test results described in this paper are restricted to WBHF data links using the shorter interleaver options, short and ultra-short. The paper reviews HF Internet Protocol (HFIP) and Subnet Relay performance over links between different geographical locations and varying power amplifier (PA) average output power levels. Finally, the paper outlines the challenges of multi-node networking over HF sky-wave links and recommendations for optimizing multi-node sky-wave network performance when all nodes cannot utilize a single HF frequency due to geographically diverse locations. (5 pages)Optimizations for efficient and transparent use of IP applications over HF links
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0372
This paper describes the architecture of an IP Gateway system implementing various enhancements to enable efficient and transparent use of standard multimedia and data IPv6 applications over strongly varying and bandwidth-limited wireless links such as HF radio. Three optimizations are proposed : (a) an HF-oriented Performance Enhancing Proxy (PEP) to improve the Quality of Service (QoS) of TCP/IP applications (b) Robust Header Compression (RoHC) of headers and (c) Joint Quality of Service and retransmissions management. Performance results obtained in real HF conditions are also presented in this article. (5 pages)Wireless sensor networks Zigbee applied on sewage treatment station
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0598
The good efficiency in a sewage treatment plant (WWTP) is a great importance to the environment. The management of electromechanical equipment installed in these stations is a major challenge due to the fact that they are installed on areas of difficult access and maintenance unhealthy and making the time for the correction of any faults is extended. This paper proposes the development of a Wireless Sensor Network (WSN), in order to monitor electromechanical equipment, allowing the Concessionaire a predictive control in real time. The design of a wireless sensors network for monitoring equipment requires not only the development and assembly of the sensor modules, but must also include the development of software for managing the data collected. Thus, this work includes a Zigbee WSN, small, adapted for monitoring of electromechanical equipment and environmental conditions of a WWTP, type stabilization pond, installed in an area of approximately 0.15 km<sup xmlns="http://pub2web.metastore.ingenta.com/ns/">2</sup> and the average flow of 320 liters of treatment per second. The experimental results show that this monitoring system can perform with the collection of parameters of performance and quality assessment at the station. (5 pages)Modification of in-service substation based on IEC 61850
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0050
The standard IEC 61850 contributes the manufacturers and the end users. But it also makes many obstacles to the modification of the conventional substation. This paper presents a scheme which modifies an in-service conventional substation gradually to a modern substation which conforms to IEC 61850 standards. The procedure of the modification is divided into three stages. During the first stage, all the preparations have been finished. All the configurations and joint tests have been done before shipment. The secondary stage is to construct the substation network. New Human Machine Interface (HMI) and communication gateway will replace the old ones. They simultaneously support protocol of the existing system and IEC 61850 standards. The third stage is the modification of the bay level devices. The old cabinets and the cables out of the cabinets are kept. The inner IEDs are replaced. The connections between the IEDs and the cabinets also need to be re-arranged. The modification of bay can be done one by one according to the overhaul plan. The process is stable and secure, and it won't affect the normal operation of the substation. (5 pages)Real time car theft decline system using ARM processor
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0059
Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibilities for taking steps to ensure the authorization for the owners and also inbuilt the anti theft system to prevent the car from theft. The existing system was. Car alarm techniques are used to prevent the car theft with the help of different type of sensors like pressure, tilt and shock & door sensors.Drawbacks are cost and cant used to find out the thief, it just prevents the vehicles from loss. The proposed security system for smart cars used to prevent them from loss or theft using Advanced RISC Machine (ARM) processor. It performs the real time user authentication (driver, who starts the car engine) using face recognition, using the Principle Component Analysis - Linear Discreminant Analysis (PCA LDA) algorithm. According to the comparison result (authentic or not), ARM processor triggers certain actions. If the result is not authentic means ARM produces the signal to block the car access (i.e. Produce the interrupt signal to car engine to stop its action) and inform the car owner about the unauthorized access via Multimedia Message Services (MMS) with the help of GSM modem. Also it can be extends to send the current location of the vehicle using the GPS modem as a Short Message Services (SMS) as passive method.A study on network intrusion detection and prevention system current status and challenging issues
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0075
A network based Intrusion Prevention System sits in-line on the network, monitoring the incoming packets based on certain prescribed rules and if any bad traffic is detected, the same is dropped in real-time. A signature based detection system was developed to perform TCP port scans, Trace route scan, ping scan and packet sniffing to monitor network. This paper is going to enhance the signature based system to monitor network traffic, creation of per-flow packet traces and adaptive learning of intrusion. The existing Hawkeye solutions are used for the network intrusion detection and prevention system. In this paper we have proposed new model which will combine the three technique such as Adaptive weighted sampling algorithm, packet count flow classifier and Adaptive learning algorithms to the existing system.Trends and issues in community telecare in the United Kingdom
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0031
With an increasing elderly population putting a strain on the cost of care, and the social, health and cost benefits of using community social care and telecare services, telecare is experiencing growth. This paper discusses trends in demand for telecare and issues with service provision and mainstreaming services and evaluates access, service reliability, the market, standards, interoperability and technology developments. (5 pages)Interoperability and standardisation in community telecare: a review
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0027
Interoperability and standardisation issues in community telecare differ from those pertaining to telemedicine and are examined with reference to older persons care. Issues discussed include devices, network transition, data characterisation, communication, data exchange, presentation, standards, protocols and certification (including IEEE 1107, ZigBee health Care, paSOS and the Continua Alliance). Standard requirements are reviewed and recommendations made, and FuTuRE, an open source telecare framework, is proposed. (6 pages)Internet of M-health Things 'm-IOT'
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0036
Internet of Things (IoT) is a new and evolving concept that provides connectivity to the Internet via sensing devices to achieve intelligent identification and management in a heterogeneous connectivity environment. From the assisted living perspective, this emerging concept will enable new communication connectivity routes between elderly disabled patient and care services through innovative networking architectures in AAL environments. M-health is defined as "mobile computing, medical sensor, and communications technologies for health care" [1]. This evolutionary concept provides both mobility and 'always connected' functionalities for different healthcare applications. In this paper we introduce a new amalgamated concept of Internet of m-health Things (m-IoT). m-IoT is a new concept that matches the functionalities of m-health and IoT for a new and innovative future (4G health) applications. In principle m-IoT introduce a new healthcare connectivity paradigm that interconnects IP-based communication technologies such as 6LoWPAN with emerging 4G networks for future Internet based healthcare services. In this paper we will present a general m-IoT architecture based on 6LoWPAN technology for measurement of body temperature as an example for healthcare application. (3 pages)Movable patient health monitoring using GPS
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0070
The Heartbeat Malfunction detector is a device which monitors the heartbeat and body temperature of a movable patient via a heartbeat Sensor, temperature Sensor and compares it against a predetermined value set and if these values cross a particular limit it would automatically alert the doctor of the patient via a sms from a Bluetooth enabled mobile, using Bluetooth Wireless Technology. A heartbeat sensor is directly connected to a microcontroller, which measures the Beat per Minute (BPM). This heart beat sensor is designed to give digital output of heart beat when a finger is placed inside it. With each heart pulse the detector signal vanes. This variation is converted to electrical pulse. This signal is amplified and triggered through an amplifier which outputs +5V logic level signal. The digital pulses are fed to the external interrupt of microcontroller 8051. By using a software counter in the code, we can count the pulses. The microcontroller (8051) is here used to develop a heart beat monitoring system. By placing your finger in between a LED and photo resistance, we can detect the pulses of heart. A temperature sensor is used to check the body temperature of patient.The measurement of universal network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1436
The network measurement is an effective way to understand and acquaint the performance and the operational state of the network. We present some methods to measure the identifier mapping, mobility and security of the Universal Network that some important characteristics are the separation of identifier and locator, authentication, and so on. In identifier mapping measurement, we propose a new indictor named mapping rate, which weighs the mapping ability of ASR. We build up three topologies for these aspects of Universal Network. Our measurement results indicate that comparing with the directly routing and forwarding of traditional network, the optimized performance of mobility and security could make up the defects of mapping in Universal Network.Traffic localization for video service on intelligent optical network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0722
The demand for high-quality video has been posing remarkable new challenges on achieving efficiency and fair utilization of network resources. High-quality IPTV and VoD has high-bandwidth requirements. Another trend is the popularity of p2p systems and it could severely strain broadband networks. In particular, without the ability to explicitly communicate with network providers, P2P applications mainly depend on inefficient network inference and network- oblivious peering, leading to potential inefficiencies for both P2P applications and network providers. In this paper, we propose a multi-domain resource management for super high-definition video delivery service which can effectively reduce the backbone network traffic. The Resource scheduling mechanism is discussed. The reduction of network traffic is measured.Moderate prefetching strategy based on video slicing mechanism for P2P VoD streaming system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1006
In peer-to-peer video-on-demand (VoD) streaming systems, each peer contributes a fixed amount of hard disk storage (usually 2GB) to store viewed videos and then uploads them to requesting peers. However, the daily hits (namely popularity) of different segments of the same video is highly diverse, which means that taking the whole video as the basic storage unit may lead to redundancy of unpopular segment replicas and scarcity of popular segment replicas in the P2P network. To address this issue, we propose a video slicing mechanism (VSM) where the whole video is sliced into small blocks (20 MB, for instance). Under VSM, peers can moderately remove unpopular blocks from and accordingly add popular blocks into their contributed hard disk storage, which increases the usage of peers' storage space. To reasonably assign bandwidth among peers with different download capacity, we propose a moderate prefetching strategy (MPS) based on VSM. Under MPS, when the amount of prefetched content reaches the predefined threshold, peers immediately stop prefetching content and then release bandwidth for other peers. We apply the MPS to PPLive VoD system and measurement results demonstrate that low server load and perfect user satisfaction can be achieved.Mapping the virtual networks with stochastic bandwidth resource request in multi-datacenters
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1464
Network virtualization allows the design of multiple diverse virtual overlay network architectures over a common physical infrastructure. A key issue in designing such virtual networks (VN) is the mapping of the VN onto the underlying substrate network. Accordingly, many research works have focused on the VN mapping problem. However, these works only consider the case where the VNs require deterministic amount of network resources. Some other works even deal with the dynamic resource demand by using over provisioning, which is simple but inefficient. In this paper, we investigate the online stochastic VN mapping (StoVNM) problem in multi-datacenters, in which the VN requests follow a Poisson distribution and the associate VN bandwidth demands follow a Normal distribution. We formulate the StoVNM problem as an optimization problem with the objective of minimizing mapping cost and load-balancing. Since the VN mapping problem is NP-hard we devise a sliding window technique based on heuristic algorithm w-StoVNM for tackling this NP-hard problem efficiently. Through extensive simulations we demonstrate the effectiveness of the proposed approach compared to traditional VN mapping solutions in terms of VN mapping cost, blocking ratio and total net revenue in the long term.Design of WAP based application for mobile security
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0443
This paper discusses how secure is your data in the mobile and the steps that can be taken to make it secure to a certain level. The major theme running through this paper is Mobile system security/ privacy. There are many Well-known problems here, particularly in Ubiquitous/pervasive/ad-hoc, computing scenarios.An identified transport layer mechanism in the locator/identifier separation context
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1418
The traditional network design puts little emphasis on security and management of the transport layer mechanisms. However, new applications requiring security such as on-line bank and on-line shopping emerge sharply. Besides, various new applications induce the problem of management for pricing, reliability and resource distribution. Hence, a secure and manageable transport layer mechanism is significant and urgent under these occasions. In this paper, we propose an identified transport layer mechanism (ITM) in the locator/identifier separation protocol (LISP) context. ITM employs mapping cache to manage the packet transmitting process and separates host identifiers from the port numbers in the transport layer. Based on this mechanism, we can achieve enhanced security and management of the network transport layer.The effects of replication on the QoS in P2P VoD systems
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1004
Replication strategy is one of the central design issues in P2P VoD systems. Given the distributed cache spaces of all peers, it aims to address how to utilize them efficiently. In this paper, we concentrate on the essential question for designing: how replication affects the QoS of requests. Unlike the previous works, in order to close to the practice, three types of replicas are differentiated: complete replicas, incomplete replicas and the replicas of viewers in the same channel. The effects of these types are quantified respectively via modeling and simulating. The model of bandwidth competition is presented and it is observed that the QoS of video is not only determined by the Availability to Demand ratio (ATD) of itself, but also influenced by the ATD of the video saved in the same peer. Both theoretical analysis and experiments show that when the viewer size is large enough, the upload capacity of incomplete replicas is equal to that of complete replicas. We argue that proportion replication is not optimal and more replicas should be assigned to the unpopular videos.Understanding users' access failure and patience in large-scale P2P VOD systems
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1007
The Online P2P Video-on-Demand (VOD) streaming system has become one of the most popular Internet applications in recent years. Together with millions of users and tens of millions of workload, comes a big challenge for quality of service. This system's time-free accessing strategy might bring about far more severe access failure than that caused by flash crowds in traditional IPTV. Why does access failure happen and how is a user's patience towards it? It is a significant problem in system optimization and user experience improvement. This paper conducts a measurement study of access failure in a largest P2P VOD system named PPlive. We first analyze the statistic characteristics of channels' access failure and its correlation with channels' popularity. Then we propose a method to infer the causal factor of access failure for each user by mining users' viewing behavior and channels' broadcasting performance. Finally we discuss the distribution of user patience facing access failure and find that the initial successful accessing experience will increase user patience. All results can help design a new personalized recommendation balancing user interests and playback quality.User data mining in a large-scale peer-assisted offline download system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1009
Peer-assisted offline download service provides a new Internet content delivery approach, in which the system coordinate dedicated servers and peers to finish a file download. This service has attracted a large number of subscribers. The related research, however, is still missing. This paper presents our preliminary measurement and analysis of users' behavior in QQXuanfeng, one of the most popular peer-assisted offline downloading applications in China. Based on a large set of real- world user data, we validate the performance of system, and cluster users according to their different usage features. The found patterns can be used to exploit potential system strategies on future design. Our work is not only a measurement result of specified goal, but also a new assessment method which can be widely used.Secure the signaling messages of mobile IPv6
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1420
Mobile IPv6 (MIPv6) is designed for IP mobility technology since Release 8[3], and DSMIPv6 as an important management based on host, applying IPSec/IKE as a default extension of MIPv6 has been adopted by 3GPP. security solution. Actually, till now there are other ways to protect the data traffic and signaling for host-based approaches. RFC 4285 proposes an alternate method for securing MIPv6 signaling messages between Mobile Nodes and Home Agents by an extension called authentication option, and recently IETF Mobility EXTensions for IPv6 (MEXT) working group adopts a WG draft which specified a means of security for MIPv6 based on Transport Layer Security (TLS). This paper presents the IPSec/IKE and authentication option security mechanism, and analyzes the problem occurred in MIPv6 working with IPSec/IKE. The security mechanism based on TLS is introduced and analyzed. Then a comprehensive comparison between the three means is given. Finally, we show the prototype implementing and testing with the TLS scheme. To the best of our knowledge, no papers have published TLS based MIPv6 signaling security implementation results.Location based services with personal area network for community and tourism applications
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0924
The Infopoint Explorer is an outdoor wireless personal area network for location-based services that allows users to access locality information interactively using mobile computing devices such as PDAs and smartphones. The Infopoint explorer was used to study the limitations imposed by inexpensive and popular wireless technologies such as Bluetooth for outdoor location-based services. The Infopoint Explorer functioned as a multimedia guidebook that allowed access to location-specific information using wireless Infopoints. The Infopoints detect and attempt to transfer multimedia content to nearby mobile computing devices using Bluetooth connectivity. An adaptive Bluetooth Inquiry Access Code algorithm was developed to reduce the time taken for the Infopoint to detect nearby devices. The Infopoint was deployed for a four-month trial.HF-PMIPv6: an enhanced fast handovers for network-based mobility management
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1067
Network-based mobility management overcomes the weakness of current host-based mobility management such as Mobile Node (MN) modification, signaling overhead and handover latency. In network-based mobility management, Fast Handovers for Proxy Mobile IPv6 (F-PMIPv6) improves packet loss for PMIPv6. However, in the F-PMIPv6 reactive mode, an MN performs handover before setting up a tunnel between the serving Mobile Access Gateway (i.e., P-MAG) and the target MAG (i.e., N-MAG). The P-MAG cannot forward the packets to the N-MAG without the tunnel and thus these packets are dropped by the P-MAG during handover. Moreover, the N-MAG establishes a tunnel to the P-MAG after the MN performs handover. The tunnel establishment increases the handover latency, the signaling cost and the tunnel transmission cost. To solve the above issues, we propose a Hybrid-mode Fast Handovers for PMIPv6 (HF-PMIPv6) mechanism. HF-PMIPv6 utilizes a decision table to detect the mobility mode (i.e., predictive or reactive). If the mobility mode is predictive, like F-PMIPv6, HF-PMIPv6 establishes a tunnel between the P-MAG and the N-MAG to prevent packet loss. On the contrary (i.e., in the reactive mode), HF-PMIPv6 performs handover directly without setting up a tunnel to reduce the extra handover latency, the signaling cost and the tunnel transmission cost. Since HF-PMIPv6 has the same performance as F-PMIPv6 in predictive mode, we evaluate the performance of HF-PMIPv6 and F-PMIPv6 in reactive mode in terms of the handover latency, the signaling cost and the packet delivery cost. (7 pages)An IPsec seamless switching mechanism with high availability and scalability by extending IKEv2 protocol
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1421
IPsec as a very popular security protocol solves the increasing problems of network security. The IPsec-gateway cluster as a solution of large-scale IPsec implement improves the availability of IPsec-gateway. The traditional IPsec-gateway cluster needs to use a large number of hardware resources to keep availability of IPsec-gateway. However, the low utilization rate of resources restricts the scalability of IPsec-gateway cluster. In this paper, we propose a new IPsec-gateway cluster mechanism by improving and extending IKEv2 protocol. Meanwhile, we design a standby IPsec-gateway Selection Algorithm (GWSA), a distributed and switch SA policy (DSAP), ESP packets synchronous and retransmission policy. This mechanism can deploy IPsec-gateways in different network segments and prevent ESP packets loss when IPsec-gateway performs switching. Through simulation, we show that the above mechanism can improve the availability and scalability of IPsec-gateway cluster.Modeling the TTL-based mapping cache
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1424
In the Locator/ID separation network, the mapping cache in the border routes plays an important part to improve the network performance and the user experience. In this paper, we model the Time-To-Live (TTL)-based mapping cache to evaluate the cache hit rate. The analytical models get a formula of the cache hit rate as a function of the distribution of packet inter-arrival time and the value of TTL. In the mapping cache, the lifetime of a cache item is reset to TTL if it is fetched. The analytical models are based on a simple assumption that the sequence of inter-arrival time of packets can be modeled as independent, identically distributed (i.i.d.) random variables. The cache hit rate depends on the inter-packet time distribution and we derive the empirical distribution of inter-packet time from our campus network data. The accuracy of our models and the i.i.d. assumption is proved by comparing the results from the trace driven simulation, the renewal assumption with the empirical distribution obtained from the trace data, and using the renewal assumption with the analytical distribution. We also give the trace driven simulation results on the number of mapping items versus the change of the TTL to better understand the mapping cache behavior.Trends of multimedia streaming development in cognitive mobile Internet
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1416
The convergence of heterogeneous wireless networks and cooperation of mobile nodes with perception, learning and cognitive ability are important characteristics of next generation Cognitive Mobile Internet (CMI). The content-rich multimedia streaming will be the most attractive services in the future wireless network. In this paper, we discussed the challenges and issues as well as future trends on multimedia streaming development in CMI. The focuses include: (i)Cognitive users' needs and behaviors modeling for intelligent video streaming business analysis; (ü)Cross-layer optimized mobile peer-to-peer network for large-scale video resources sharing; (iii) Cognitive transport layer protocol with ability of spectrum and routing perception, real-time multimedia transmission control, and concurrent multipath transfer for multi-spectral channels; (iv)Cognitive routing protocol for adapting to dynamic CMI topology, routing and resource changes. The proposed research structure aims to improve overall system performance and achieve high users' Experience of Quality for multimedia streaming service in future mobile internet.The realization of mobile phone short messages advertising platform
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1488
With the rapid growth of the number of mobile phone users, mobile phone has become the most effective carrier for people to get information due to its' convenience and readiness, moreover, Short Message Service (SMS) is the most common form that is used to deliver information. Unlike radio, television, newspapers, magazines and other media, using cell phone to send advertisements messages has faster speed, wider distribution range and better accuracy. Therefore, SMS advertising platform emerges thanks to market demand. This platform can receive many subscribers' requests, which includes advertising messages, the amount and time of the release, and other requirements, then queue into distribution lines, issue them to the SMS center through the corresponding gateway protocols, then deliver them to a certain number and scope of mobile phones, so as to achieve the purpose of advertising.Wireless home gateway: software-defined radio architecture and applications
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0688
Nowadays, wireless network in digital home is popular in academic and industrial areas. Digital home provides lots of convenience for our daily life. This paper introduces an applicable method of designing a wireless home gateway based on Software-Defined Radio to realize a household appliances control system. The home gateway by GNU Radio and Universal Software Radio Peripheral (USRP) is adopted to build the system, which can receive multi-standard control signals and coordinate home appliances by Zigbee networking. Meanwhile, the system is practical and flexible through the extensible interface.Ubiquitous femto awareness application access and service recommendation
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0723
Ubiquitous Femto is a service engine that allows small or middle scale enterprise users to access application easily using whatever device or platform, or home users to get mobile recommendation services and makes this information controllable by closed subscriber group users. The goal of ubiquitous Femto awareness is ubiquitous access, sharing, and interaction. Its accessibility is based on an Application Programming Interface (API) protocol. This API can be used by various client applications to access Femto-enabled systems. In this paper, we present the service architecture and features for enabling Femto to provide specific applications to accessed clients. To demonstrate the feasibility of the architecture, we also present the development of hardware and software platform that facilitates the realization and verification of rich value-added functions on Femto-enabled networks.A new framework to design distributed query system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1471
This paper proposes a new framework to design query systems which could be used in DNS systems. An efficient ILP model, which is able to take network layer information into count, is formulated to design such query systems. By simulation, we demonstrate that query system in our framework can relax unnecessary constraint and trade off between query delay and storage cost.Computer forensics in communication networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0914
With the rapid development of information technologies and wide use of computer networks, computer forensics has become an active research area due to increasingly criminal activities in communication networks and information security. The research of computer forensics studies thorough and effective security technologies and approaches for investigation of computer crimes, with a focus on the truth, reliability, completeness and legality. This paper analyzes in depth computer forensic technologies in dealing with the criminal activities in communication networks.Multiprotocol communication for mobile devices
http://dl-live.theiet.org/content/conferences/10.1049/ic.2010.0214
Mobile devices like PDAs or mobile phones have become widespread. Similarly network functionality like GSM, Bluetooth or WLAN has become a standard. Nevertheless, not many applications take mobility into account. An application and its communication component are tightly coupled and the applications assume that network behaviour does not change. Here in this paper we propose a new lightweight architecture consisting of a small foot-print core layer and a modularised pluggable infrastructure. The architecture presented in this paper is suitable for mobile devices and extensible to make use of abstractions to conquer heterogeneity in mobile devices. The architecture also extends connectivity of devices to access remote applications. Multiple device interfaces can be used in the same session to extend the connectivity range. (6 pages)M-PSK MB-OFDM ultra wideband communication system performance for 4G high-rate IEEE 802.15.3a wireless personal area networks
http://dl-live.theiet.org/content/conferences/10.1049/ic.2010.0217
The emerging Ultra Wideband (UWB) communication system is highly suitable for wireless multimedia connectivity in home and SOHO (Small Office Home Office) scenarios. As such, UWB is an example of enabling technology for Fourth Generation (4G) communication systems designed to replace Bluetooth communications. Indeed, UWB radio will revolutionise Wireless Personal Area Networks (WPANs) allowing the wireless transmissions of high data rates (hundreds of Mbps) over short distances (0-10 m). This paper deals with the design and performance of M-ary PSK based Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) UWB communication system over realistic multipath-fading modified Saleh-Valenzuela (S-V) channel environments as specified by the IEEE 802.15.3a Task Group. A system level analysis is addressed to improve the throughput and transmission range as a function of coded BER, link PER, received SNR and distance through extensive Monte Carlo simulations. (6 pages)On the study of a ubiquitous healthcare network with security and QoS
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0551
As a consequence of rapid technological development, the normally isolated medical sensor platform is gradually being integrated into networks. However, most ubiquitous or mobile health systems are lacking a system that combines both network security and QoS (Quality of Service). In this paper investigates the possible security and QoS methods of a ubiquitous healthcare (U-healthcare) network platform in OSI (Open System Interconnections)-layers. This network platform is based on the Wireless Overlay Networks (WON) Bluetooth, 802.11 and 802.16 over IPv6 Network, and provides a secure and stable U-healthcare platform by including the application of healthcare sensors with RFID, U-healthcare PDA VoIPv6, falling detection, and patient orientation.Research and design of the PMI-based access control model for OpenVPN
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0724
Open VPN is commonly used to remotely access a variety of resources in the enterprise networks. However, there is a deficiency that Open VPN can only provide coarse-grained access control. It brings in security problems in accessing the key resources with different security levels. To solve this problem, this paper analysis the security technology and the traditional access control of OpenVPN, and proposed a novel fine-grained access control model which is based on the Privilege Management Infrastructure (PMI). This model extended the handshake procedure of OpenVPN by adding the authentication of Attribute Certificate. The authentication of Attribute Certificate which we added is optional. Our access control model is efficient by completing the authentication and authorization at the same time.Safety arguments for next generation, location aware computing
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0813
Concerns over accuracy, availability, integrity, and continuity have limited the integration of Global Positioning System (GPS) and Global Navigation Satellite System (GLONASS) for safety-critical applications. More recent augmentation systems, such as the European Geostationary Navigation Overlay Service (EGNOS) and the North American Wide Area Augmentation System (WAAS) have begun to address these concerns. Augmentation architectures build on the existing GPS/GLONASS infrastructures to support location-based services in Safety of Life (SoL) applications. Much of the technical development has been directed by air traffic management requirements, in anticipation of the more extensive support to be offered by GPS III and Galileo. WAAS has already been approved to provide vertical guidance for aviation applications. During the next twelve months, the full certification of EGNOS for SoL applications is expected. This paper discusses similarities and differences between the safety assessment techniques used in Europe and North America. (6 pages)Service mobility support for pervasive grid based on SIP
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0531
The goal of Next Generation Grid and pervasive computing models are two of the new models that attract a lot attention in last few years. The current trend is to integrate the two domains, called pervasive grid, where mobile devices can access and provide services. Most current researches adopt the concept that services run in a device and migrate with the device. System developers deal with the problems respectively. They adopt device mobility method to handle the former and service registry system to solve the latter, the traditional manner misses the situation that services may migrate from one device to another and will limit the development of pervasive grid application, ex. personal computing, load balance, etc. In this paper, we transfer the focus from mobile device to mobile service and view each service as an individual network node. We adopt Session initiation Protocol (SIP) to build pervasive grid communication environment and propose a hierarchical SIP architecture to reduce the hand-off frequency caused by the increasing network nodes. Operation details are given and application scenario is presented as a proof of the concept.Unified management information model for connection-oriented and connectionless networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0753
This paper describes a generic unified management information model for connection-oriented and connectionless networks in a technology-independent way based on the unified functional architecture of transport networks. The model is described in UML and tabular format along with detailed managed object descriptions in terms of attributes, notifications and entity relationships.Research of TSM security property in Parlay/OSA based on formal analysis
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0616
As a key service providing technology in NGN, the Parlay/OSA realizes the separation between service creation and lower layers network completely. Parlay/OSA open the network recourses to the 3<sup xmlns="http://pub2web.metastore.ingenta.com/ns/">rd</sup> party, and makes use of the Parlay framework interface to suit service creation by 3rd party. However, it is inevitable that there are some security hidden troubles in providing application programming interfaces (APIs). In this paper, we focus on authentication process on Parlay/OSA framework interface, and make use of formal analysis instrument to analyze the security of Parlay/OSA. As a result of this analysis, some security flaws have been present.A study on semantic overlay network topology of P2P based on node location
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0715
Two algorithms are proposed to decrease the communication capacity and consumption of system resources for resource location in P2P networks. Experiment result shows that these algorithms can reduce communication cost significantly, utilize system resources effectively, and improve the overall performance of resource location in P2P networks.Enhanced interoperability and communications for the highways agency and English motorways
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0384
This paper describes a project initiative aimed at providing a self-establishing, self-healing IP-based broadband network, and associated applications, for enhancing communications at major incidents and disasters. This project forms part of a programme of continued improvement for the Highways Agency's Traffic Officer Service, and aims to provide a framework which will lead to full inter-working and data sharing with the emergency services. (5 pages)Performance evaluation of Gfarm and GPFS-WAN in data grid environment
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0530
The network technologies and storage devices are developing quickly and the technical devices are inexpensive. Therefore, users have a large amount of storage space, Data Grid can collect distributed storage device to share to other users. In this paper, we discuss several file systems that consist of NFS, SRB, iRODS, Lustre, Gfarm and GPFS-WAN. In Data Grid, we select the specific file system to administrate the storage devices. We must consider the file system that obtains scalibilty, security and stability. Finally, we choose two file systems that consist of Gfarm and GPFS-WAN to be our evaluative target. Gfarm and GPFS-WAN are used to build up large-scale dataset storage system that consists of PRAGMA and TeraGrid, respectively. In this paper, we use Gfarm and GPFS-WAN to create a Data Grid environment and evaluate the performance of data transmission, respectively. As results, the GPFS-WAN's performance of data transmission is better than Gfarm. The data transmission is one of the factors in Data Grid environment. For instance, the system obtains replication, open source software, easy to install and maintain that is important to be a great Data Grid environment, these important information will be discussed in this paper.SU-PeerCast: A P2P live streaming system with super-node based on peercast
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0713
The amount of client a live streaming system can serve by unicast is limited by the bandwidth requirement. Theoretically, IP-multicast is an efficient solution for that situation, but it suffers from poor deployment. Therefore, another solution, called Application Layer Multicast (ALM), is being increasingly recognized as a available alternative. However, this solution also has certain shortcomings. In this paper, we firstly introduce a live streaming system-PeerCast based on application layer multicast, and besides that we indicate its existing problems under practical deployment in the large-scale network. Secondly, in order to improve the PeerCast system performance, we append a Super-Node layer, which can divide the live system into different domains, and re-design the play process and heartbeat detection mechanism for our new live system. Finally, the re-designed system performance evaluation is presented.Research on networked product development technology based on green design engine
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.1267
Aiming at the problem that green design requires a lot of green design resources and design knowledge, in this article the architecture of networked green design is established combining the superiority of product networked exploration on the basis of analysis of green design processes and characteristics. This article also presents the workflow and implementation mechanism of green product design drove by green design engine through the research and development of networked green design engine and provides support for networked green design of product by green design engine technology.Network management interface automatic testing framework based on model-driven
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0723
Due to the complexity and variability of network management interface requirements and the diversity of network management interface technologies, complete testing on network management interfaces has been a challenge. In this paper, an automatic testing framework considering factors of test process, people, services and information is put forward in order to enhance test automatization and reduce test cost of time and manpower. This paper proposes the classification concept for test requirement information model and test record information model, and proposes a multi-layer test model content construction which can bring advantages of simplifying interface test complexity. In this framework, a series of kernel test services is designed as execute engines and can collaborate with each other to implement the whole test process more automatically.One data preprocessing method in high-speed network intrusion detection
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0618
With the development and popularization of highspeed network technology, the Intrusion Detection System need to process more and more data. In most cases, only a small part of the data which need to be processed is the abnormal data. The abnormal data will be overwhelmed by the normal data. A large number of normal data will occupy most of resources of the IDS and lead to a lot of false alarms. These all will bring troubles for Intrusion Response System and administrators. In this paper, we present a method based on semi-supervised learning to process the massive data in the high-speed network. We add some representative and labeled data to the large unlabeled dataset, and let them cluster. We regard the data which is most similar to the labeled data as normal data. It is suggested that the method can reduce the redundant data and false alarms efficiently, and also can improve the computation time.Design of secure DiffServ ingress edge routers
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0617
Classical Differentiated Service (DiffServ) routers have not considered the security problem in their designs, generally, they have no ability to countering Denial of Service (DoS ) attacks because of their simple system structures. DoS attacks against DiffServ clients are more targeted and require less attack bandwidth than current attacks for classical DiffServ routers due to the per-client and per-class bandwidth limitations, since they must be imposed to ensure QoS guarantees. To solve the problem, in this paper, we present the design of new ingress DiffServ edge router(IDER) for defeating DoS attacks on DiffServ clients. The classifier and access control model of ingress DiffServ edge routers(IDERs) secure the Quality of Service (QoS) by policing traffics and limiting the data rate and access number of traffics, and distinguish the traffics with higher priorities from malicious traffics. The algorithms of secure TCP AQM and UDP AQM are derived from two fluid models. The network behaviors of proposed secure IDERs have been simulated by several to two fluid models with the traffic policing.To group at the base of users' usage preference of network services based on fast hierarchical clustering algorithm
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0763
Because possessing the huge superiority on selective services marketing, which could bring tremendous research value, user's usage preference of network services is becoming an issue. But there was seldom research on grouping services. In this paper we investigate the grouping services, and concretely study the clustering algorithm, which based on the users' usage preference of network services grouping, and compare the time complexity and the clustering results of classical clustering algorithms, and choose the hierarchical clustering algorithm to group the network users according to the characteristics of analytical data and the analysis of demand. Meanwhile, as to the high time complexity of classical hierarchical clustering algorithm, we improved it by introducing a fast hierarchical clustering algorithm, which could merge many data samples at a time based on entropy grouping and data characteristics, and this algorithm significantly reduce the time complexity. Research results provide a specific grouping for services preference. In this way, data is provided for selective management and commercial package customization.Relationship between transportation and land use based on data of mobile communication
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.1097
Within the past decades although massive amounts of money and human resources have been put to solve the traffic congestion problem through the world, road congestion still a persistent major factor which has a strong effect on daily life. How to get useful traffic information is a big problem, in the past, such as loop detects, video surveillance is a good idea. Cell phone information is available directly from the mobile carriers, requiring less installation cost and labour work compared to other methods such as conventional loop-detectors and resident surveys.Trustchord: chord protocol based on the trust management mechanism
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0721
We introduce TrustChord, a novel chord protocol. TrustChord modifies the traditional chord protocol, using the trust certificate mechanism and the trust management mechanism. TrustChord can find and defense the common attacks from malicious nodes. It can find the malicious node' attack behavior, and use the trust management mechanism to update and maintain the node's trust value. Through the node's trust value we can judge whether the node is malicious node or not. The trust management mechanism will remove the node whose trust value is lower than the threshold we set. Finally, TrustChord can make the chord network composed by good nodes.Research and implementation of IPv6 controllable multicast in the campus network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0615
In allusion to PIM-SSM multicast model work mechanism in the IPv6 campus network, analyzing key technologies of controllable multicast, making use of controllability of network devices for multicast reported packets of multicast user joining (S,G) channel, putting forward PIMSSM controllable multicast realization framework in the IPv6 campus network. Combining with deployment of multicast management server, multicast authentication server, multicast security policy server and multicast monitoring server, constituting management and control with multicast address, multicast source, multicast receiver, and real time monitoring to multicast operating status, achieving muticast operation management and control in order in the IPv6 campus network.