Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 5, Issue 4 - Dec 2009
Volume 5, Issue 3 - Sep 2009
Volume 5, Issue 2 - Jun 2009
Volume 5, Issue 1 - Mar 2009
Selecting the target year
Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Wu, Tin-Yu ; Chao, Han-Chieh ; Lo, Chi-Hsiang ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 117~130
DOI : 10.3745/JIPS.2009.5.3.117
By providing ubiquitous Internet connectivity, wireless networks offer more convenient ways for users to surf the Internet. However, wireless networks encounter more technological challenges than wired networks, such as bandwidth, security problems, and handoff latency. Thus, this paper proposes new technologies to solve these problems. First, a Security Access Gateway (SAG) is proposed to solve the security issue. Originally, mobile terminals were unable to process high security calculations because of their low calculating power. SAG not only offers high calculating power to encrypt the encryption demand of SAG's domain, but also helps mobile terminals to establish a multiple safety tunnel to maintain a secure domain. Second, Robust Header Compression (RoHC) technology is adopted to increase the utilization of bandwidth. Instead of Access Point (AP), Access Gateway (AG) is used to deal with the packet header compression and de-compression from the wireless end. AG's high calculating power is able to reduce the load on AP. In the original architecture, AP has to deal with a large number of demands by header compression/de-compression from mobile terminals. Eventually, wireless networks must offer users "Mobility" and "Roaming". For wireless networks to achieve "Mobility" and "Roaming," we can use Mobile IPv6 (MIPv6) technology. Nevertheless, such technology might cause latency. Furthermore, how the security tunnel and header compression established before the handoff can be used by mobile terminals handoff will be another great challenge. Thus, this paper proposes to solve the problem by using Early Binding Updates (EBU) and Security Access Gateway (SAG) to offer a complete mechanism with low latency, low handoff mechanism calculation, and high security.
Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
Hao, Guo ; Tao, Guo ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 131~134
DOI : 10.3745/JIPS.2009.5.3.131
Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.
Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks
Zhi-bin, Zhao ; Fuxiang, Gao ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 135~144
DOI : 10.3745/JIPS.2009.5.3.135
Most of the tasks in wireless sensor networks (WSN) are requested to run in a real-time way. Neither EDF nor FIFO can ensure real-time scheduling in WSN. A real-time scheduling strategy (RTS) is proposed in this paper. All tasks are divided into two layers and endued diverse priorities. RTS utilizes a preemptive way to ensure hard real-time scheduling. The experimental results indicate that RTS has a good performance both in communication throughput and over-load.
Topological Boundary Detection in Wireless Sensor Networks
Dinh, Thanh Le ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 145~150
DOI : 10.3745/JIPS.2009.5.3.145
The awareness of boundaries in wireless sensor networks has many benefits. The identification of boundaries is especially challenging since typical wireless sensor networks consist of low-capability nodes that are unaware of their geographic location. In this paper, we propose a simple, efficient algorithm to detect nodes that are near the boundary of the sensor field as well as near the boundaries of holes. Our algorithm relies purely on the connectivity information of the underlying communication graph and does not require any information on the location of nodes. We introduce the 2-neighbor graph concept, and then make use of it to identify nodes near boundaries. The results of our experiment show that our algorithm carries out the task of topological boundary detection correctly and efficiently.
Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Quan, Shan Guo ; Xu, Jian ; Kim, Young-Yong ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 151~158
DOI : 10.3745/JIPS.2009.5.3.151
This paper proposes a utility-based data rate allocation algorithm to provide high-quality mobile video streaming over femtocell networks. We first derive a utility function to calculate the optimal data rates for maximizing the aggregate utilities of all mobile users in the femtocell. The total sum of optimal data rates is limited by the link capacity of the backhaul connections. Furthermore, electromagnetic cross-talk poses a serious problem for the backhaul connections, and its influence passes on to mobile users, as well as causing data rate degradation in the femtocell networks. We also have studied a fixed margin iterative water-filling algorithm to achieve the target data rate of each backhaul connection as a counter-measure to the cross-talk problem. The results of our simulation show that the algorithm is capable of minimizing the transmission power of backhaul connections while guaranteeing a high overall quality of service for all users of the same binder. In particular, it can provide the target data rate required to maximize user satisfaction with the mobile video streaming service over the femtocell networks.
Automatic In-Text Keyword Tagging based on Information Retrieval
Kim, Jin-Suk ; Jin, Du-Seok ; Kim, Kwang-Young ; Choe, Ho-Seop ;
Journal of Information Processing Systems, volume 5, issue 3, 2009, Pages 159~166
DOI : 10.3745/JIPS.2009.5.3.159
As shown in Wikipedia, tagging or cross-linking through major keywords in a document collection improves not only the readability of documents but also responsive and adaptive navigation among related documents. In recent years, the Semantic Web has increased the importance of social tagging as a key feature of the Web 2.0 and, as its crucial phenotype, Tag Cloud has emerged to the public. In this paper we provide an efficient method of automated in-text keyword tagging based on large-scale controlled term collection or keyword dictionary, where the computational complexity of O(mN) - if a pattern matching algorithm is used - can be reduced to O(mlogN) - if an Information Retrieval technique is adopted - while m is the length of target document and N is the total number of candidate terms to be tagged. The result shows that automatic in-text tagging with keywords filtered by Information Retrieval speeds up to about 6
40 times compared with the fastest pattern matching algorithm.