Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1298239acmconferencesBook PagePublication PagesmswimConference Proceedingsconference-collections
Q2SWinet '07: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
ACM2007 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSWiM07: 10th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems Chania Crete Island Greece 22 October 2007
ISBN:
978-1-59593-806-0
Published:
22 October 2007
Sponsors:

Reflects downloads up to 16 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 3rd ACM International Workshop on QoS and Security for Wireless Mobile Networks -- Q2SWinet 2007. Continuing the tradition of the two previous Q2SWinet events held in Montreal (Canada) and Torremolinos (Spain), this year's workshop reaffirms the relevance and interest of research on QoS and Security topics in wireless systems. This workshop has become a wonderful forum for discussion and presentation of original ideas, recent results and achievements on various issues and challenges related to QoS and Security on different layers and different technical viewpoints. The objective of the workshop is to give researchers and practitioners a unique opportunity to share and enlarge their perspectives and ideas with each other through a stimulating program.

The call for papers of this workshop has attracted 54 quality submissions from Asia, Canada, Europe, Africa, and the United States. The program committee accepted 18 papers, which represent a 33% acceptance rate and cover a variety of topics, including QoS management in wireless/mobile systems, scheduling, routing, multicast, mobility, and security management. In addition, the program includes a poster session that hosts ten relevant paper contributions on the same topics. The accepted papers come from 16 countries, reflecting the fact that this workshop is very international. We hope that the proceedings will serve as a valuable reference for the worldwide researchers and developers working on wireless systems, mobile applications and services.

Based upon the TPC recommendation, the following three papers have been selected as candidates for the Q2SWinet 2007 Best Paper Award:

  • "A Multi-channel Defense Against Jamming Attacks in Wireless Sensor Networks", Ghada Alnifie and Robert Simon (George Mason University, USA)

  • "A Dynamic Bandwidth Allocation Algorithm for Supporting Real-time Applications in 802.15.3 WPANs", G. Boggia, P. Camarda, L. A. Grieco, G. Tomasicchio (DEE - Politecnico di Bari, Italy)

  • "Decentralized Group Key Management for Dynamic Networks Using Proxy Cryptography", Junbeom Hur, Youngjoo Shin, Hyunsoo Yoon (KAIST, Korea)

.

Skip Table Of Content Section
SESSION: QoS scheduling and multimedia
Article
Assessing the effectiveness of longest-in-system (lis) schedulingin ad hoc networks

Ad hoc networks are composed by independent mobile stations that,besides acting as traffic sources and sinks, cooperate on packet forwarding tasks, acting both as endpoints and routers. The purpose of this work is to analyze the impact of different ...

Article
A dynamic bandwidth allocation algorithm for supporting real-time applications in 802.15.3 wpans

The 802.15.3 Task Group was formed to create a standard that would enable wireless connectivity of high-speed, multi-media capable portable consumer devices within a Wireless Personal Area Network (WPAN). In particular, the 802.15.3 standard defines a ...

Article
Qos enhancement for multimedia traffics with dynamic txoplimit in ieee 802.11e

The transmission opportunity (TXOP) mechanism defined in the IEEE 802.11e Hybrid Coordination Function (HCF) allows a wireless station to transmit a burst of frames back-to-back without re-entering the channel contention phase. Unfortunately, the ...

SESSION: QoS routing in ad hoc and sensor networks
Article
A simulation study of xcp-b performance in wireless multi-hop networks

XCP-b proposes a modification to the XCP router algorithm that computes the spare bandwidth. The modification removes the need for an XCP router to know the exact capacity of the channel, making it possible to use the XCP-b variant in transmission media ...

Article
Near optimal geographic routing with obstacle avoidance in wireless sensor networks by fast-converging trust-based algorithms

Geographic routing scales well in sensor networks, mainly due to its stateless nature. Still, most of the algorithms are concerned with finding some path, while the optimality of the path is difficult to achieve. In this paper we are presenting a novel ...

Article
Stimulating cooperation in route discovery of ad hoc networks

In autonomous ad hoc network, nodes belonging to different entities try to maximize their own utilities. Selfish dropping of route control packets relieves node of relaying packets for others and saves its own resources. Current watchdog or ACK-based ...

SESSION: QoS multicast and mobility
Article
Integration of mobility and qos in 4g scenarios

Next Generation Networks (NGN) will be based upon the "all IP" paradigm. The IP protocol will glue multiple technologies, for both access and core networks, in a common and scalable framework that will provide seamless communication mobility not only ...

Article
Performance evaluation of qos-agent assisted mipv6 handoff scheme

To achieve smooth delivery of real-time traffic in heterogeneous mobile networks, QoS-aware MIPv6 handoff is desirable. Considering that different QoS models may be applied in the traffic path, our previously-proposed QoS Agent-assisted MIPv6 handoff ...

Article
Multicast qos support in ieee 802.16

Multicast is a very popular bandwidth-conserving technology exploited in many multimedia applications. However, the existing IEEE 802.16 spec. provides no error recovery mechanism (ARQ) for multicast traffic. ARQ absence in wireless networks unreliable ...

SESSION: Anonymity and authentication
Article
Optimized ticket distribution scheme for fast re-authentication protocol (fap)

In this paper we introduce a ticket distribution scheme for Fast re-Authentication protocol (FAP) for inter-domain roaming. FAP is designed to reduce the authentication time of a mobile user in a visited administrative domain. The approach eliminates ...

Article
Anonymous topology discovery for multihop wireless sensor networks

Topology discovery in wireless sensor networks typically starts by transmitting a special beacon signal from the sink. This method, although simple and efficient, reveals the location of the sink within the network. We propose an anonymous topology ...

Article
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks

In ad hoc networks, a collection of wireless hosts cooperates to transmit packets to each other, even if they are beyond their direct wireless transmission range. Recently, many proposed routing protocols provide routing services for ad hoc networks. In ...

SESSION: Secure synchronization and attacks management
Article
A multi-channel defense against jamming attacks in wireless sensor networks

Radio jamming in wireless sensor networks is an effective means by which an attacker can disrupt communication between sensor nodes. The purpose of such an attack can be to delay or prevent nodes from reporting their readings to the basestation, to ...

Article
Secure, accurate and precise time synchronization for wireless sensor networks

Secure time synchronization is a key service for wireless sensor networks (WSN). The special nature of WSNs imposes challenging and intertwined requirements on secure time synchronization design. We show that secure time synchronization techniques ...

Article
Methodologies and frameworks for testing ids in adhoc networks

Testing Intrusion Detection Systems (IDS) has been a substantial part of the development lifecycle, since the first prototypes and products appeared on the market. Unfortunately, many of the existing principles, procedures and systematic frameworks for ...

SESSION: Group key and identity management
Article
Decentralized group key management for dynamic networks using proxy cryptography

Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous ...

Article
Sahnet: a secure system for ad-hoc networking using ecc

Communicating nodes in an ad-hoc network cannot rely on a fixed security infrastructure and cannot assume a specific security mechanism in the network. This requires careful consideration for the security architecture they apply.

In this paper, we ...

Article
Denial-of-service resilience password-based group key agreement for wireless networks

Wireless networks are very convenient as they allow mobile users to be connected whenever and wherever they desire. Group key agreement (GKA) protocols are used in these networks to allow secure group communications among the wireless nodes. Password-...

POSTER SESSION: Poster session
Article
Providing qos for streaming traffic in mobile network with mobile router

Mobile network is frequently faced with link disconnection problem. In such cases, mobile router in the network takes a role of an access point to the infrastructure. Thus, a mobile router must have both a routing protocol for the moving network itself ...

Article
Qos modeling for performance evaluation over evolved 3g networks

The end-to-end Quality of Service (QoS) must be ensured along the whole network in order to achieve the desired service quality for the end user. In hybrid wired-wireless networks, the wireless subsystem is usually the bottleneck of the whole network. ...

Article
Integrating trust reasonings into node behavior in olsr

In ad hoc networks, route discovery and maintenance introduce specific security problems for routing protocols to prevent, detect or respond. For the OLSR routing protocol, the correct routing operation requires an expected node behavior regarding the ...

Article
On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective

In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes. In our framework,...

Article
A performance analysis of distributed qos negotiation during session establishment

In order to achieve guaranteed services, we need to negotiate network resources providing the required quality of services(QoS). For this reason, the common set-up process of servicesession is divided into three phases. At first, the application ...

Article
Security of predefined groups in manets

MANETs (Mobile Ad hoc NETworks) allow to deploy networks without any preexisting infrastructure. They are appealing approach for battlefield and emergency networks since they permit to easily interconnect the units that are engaged on the field. An unit ...

Article
Qos for wireless interactive multimedia streaming

This paper presents an efficient approach for supporting wireless interactive multimedia streaming services. One of the main goals of wireless video interactive services is to provide priority including dedicated bandwidth, controlled jitter (required ...

Article
Two privacy enhanced context transfer schemes

Foreseeable 4G environments will extensively take advantage of the concept of context transfer to provide seamless secure handovers between different administrative domains. However, the utilization of context transfer comes with a cost in the users' ...

Article
Regional-based authentication against dos attacks in wireless networks

In this work we focus on resource depletion attacks within IEEE 802.11 networks. This type of DoS attacks is used to exhaust access points' resources resulting in denying service to legitimate clients and rising the opportunity for more sophisticated ...

Article
A secure voip conference system: architecture analysis and design issues

In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation fundamentals of the ...

Contributors
  • National Cheng Kung University
  • University of Bologna
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 46 of 131 submissions, 35%
YearSubmittedAcceptedRate
Q2SWinet '22471634%
Q2SWinet '14301447%
Q2SWinet '10541630%
Overall1314635%