Both symmetric and asymmetric key algorithms are used to secure a network. Asymmetric key approach involves greater time complexity and hence prone to higher power consumption. Symmetric key cryptography, on the other...
详细信息
ISBN:
(纸本)0769530451
Both symmetric and asymmetric key algorithms are used to secure a network. Asymmetric key approach involves greater time complexity and hence prone to higher power consumption. Symmetric key cryptography, on the other hand, involves a key exchange phase. In this paper, we propose an authentication technique for new nodes to an ad-hoc network that would also extract the advantages of both symmetric and asymmetric key cryptography while avoiding the adversities. In the proposed collaborative technique, the new node is not only authenticated, but the request-reply messages have been used to generate a secret key at the two ends. The proposed algorithm estimates the distance of a node X from the power loss of a message from X. Both the sender and the receiver separately compute the same secret key based on this distance. The proposed algorithm does not use GPS and identifies location of nodes by distance and direction only.
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically...
详细信息
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically and immediately according to the current communication load. This is done without any explicit monitoring or calibration of the system. Additionally, the paper includes a detailed performance evaluation
Modern society is heavily dependent on wireless networks for providing voice and data communications. Wireless data broadcast has recently emerged as an attractive way to disseminate dynamic data to a large number of ...
详细信息
ISBN:
(纸本)142440505X
Modern society is heavily dependent on wireless networks for providing voice and data communications. Wireless data broadcast has recently emerged as an attractive way to disseminate dynamic data to a large number of clients. In data broadcast systems, the server proactively transmits the information on a downlink channel; the clients access the data by listening to the channel. Wireless data broadcast systems can serve a large number of heterogeneous clients, minimizing power consumption as well as protecting the privacy of the clients' locations. The availability and relatively low cost of antennas resulted in a number of potential threats to the integrity of the wireless infrastructure. In particular, the data broadcast systems are vulnerable to jamming, i.e., the use of active signals to prevent data broadcast. The goal of jammers is to cause disruption, resulting in long waiting times and excessive power consumption. In this paper we investigate efficient schedules for wireless data broadcast that perform well in the presence of a jammer. We show that the waiting time of client can be reduced by adding redundancy to the schedule and establish upper and lower bounds on the achievable minimum waiting time under different requirements on the staleness of the transmitted data
A home network service middleware called "UKARl-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middle...
详细信息
ISBN:
(纸本)0769527256
A home network service middleware called "UKARl-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middleware using distributed function elements on the networked appliances. The middleware uses a service scenario description framework on the basis of BPEL, an XML language to define business processes, to set up the service according to the present situation. In this paper, we describe the overview and of the home network service middleware and its service scenario description. Then implementation of an emulator for the set-vice scenario description framework is reported. It is noted that the proposed description framework can be constructed easily by using the existing toolkits.
A home network service middleware called "UKARI-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middle...
详细信息
A home network service middleware called "UKARI-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middleware using distributed function elements on the networked appliances. The middleware uses a service scenario description framework on the basis of BPEL, an XML language to define business processes, to set up the service according to the present situation. In this paper, we describe the overview and of the home network service middleware and its service scenario description. Then implementation of an emulator for the service scenario description framework is reported. It is noted that the proposed description framework can be constructed easily by using the existing toolkits
This panel paper presents the views of six researchers and practitioners of simulation modeling. Collectively we attempt to address a range of key future challenges to modeling methodology. It is hoped that the views ...
详细信息
ISBN:
(纸本)9780780387867
This panel paper presents the views of six researchers and practitioners of simulation modeling. Collectively we attempt to address a range of key future challenges to modeling methodology. It is hoped that the views of this paper, and the presentations made by the panelists at the 2004 Winter Simulation Conference will raise awareness and stimulate further discussion on the future of modeling methodology in areas such as modeling problems in business applications, human factors and geographically dispersed networks; rapid model development and maintenance; legacy modeling approaches; markup languages; virtual interactive process design and simulation; standards; and Grid computing.
This panel paper presents the views of six researchers and practitioners of simulation modeling, Collectively we attempt to address a range of key future challenges to modeling methodology. It is hoped that the views ...
详细信息
This panel paper presents the views of six researchers and practitioners of simulation modeling, Collectively we attempt to address a range of key future challenges to modeling methodology. It is hoped that the views of this paper, and the presentations made by the panelists at the 2004 Winter Simulation Conference will raise awareness and stimulate further discussion on the future of modeling methodology in areas such as modeling problems in business applications, human factors and geographically dispersed networks;rapid model development and maintenance;legacy modeling approaches;markup languages;virtual interactive process design and simulation;standards;and Grid computing.
暂无评论