The 2005 Sendai International Workshop

needmorebaitΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

67 εμφανίσεις

1
The 2005 Sendai International Workshop
on
Network Security and Wireless Communications




Following the great success achieved in the past two workshops, we are pleased to inform you
that Sendai will be hosting for the third time the 2005 Sendai International Workshop. The
workshop will be held at the Hotel Sendai Plaza on 27
th
January 2005. The scope of the 2005
workshop is focused on recent and future trends in network security and wireless
communication technologies. Distinguished professors from overseas will be presenting their
pioneering contributions in the wireless and security areas. The workshop is annually sponsored
by the Japanese Ministry of Education, Culture, Sports, Science and Technology as a
part of the Sendai Cyber-Forest Project.




Date:
Thursday, January 27, 2005 13:00 ~18:30
Avenue:
Hotel Sendai Plaza, 2
nd
Floor, Room AOI
Sponsors:

Sendai Cyber-Forest Project (Supported by the Ministry of
Education, Culture, Sports, Science and Technology.)
Organizers:

 Nemoto laboratory, Graduate School of Information Sciences, Tohoku Univ.
 Kato laboratory, Graduate School of Information Sciences, Tohoku Univ.



For further information, please visit
http://www.it.ecei.tohoku.ac.jp/~kato/



2

The 2005 Sendai International Workshop Program

Jan. 27
th
, 2005 13:00 - 18:30


13:00 - 13:10
Professor Yoshiaki Nemoto, Tohoku University, Japan

“Openingç Address”

13:10 - 13:50 Prof. Abbas Jamalipour, University of Sydney, Australia.

Future Trends in Mobile Communications – Resource and Security
Management”

13:50 - 14:30 Prof. Victor O.K. Li, University of Hong Kong, P. R. China

Security of Ad Hoc Wireless Networks”

14:30 - 14:55
Dr.
Atsuhiro Goto, Information Sharing Platform Laboratories, NTT,
Japan

“Safe and Secure Ubiquitous Communication


14:55 - 15:20
Dr. Yuji Waizumi, Tohoku University, Japan.
“A Statistical Anomaly Detection Technique based on Three Different
Network Features”

15:20 - 15:40 COFFEE BREAK

15:40 – 16:20 Prof. Sergio Palazzo, University of Catania, Italy
“Research Issues in Satellite and Wireless Networks: Experiences and
Lessons at the University of Catania”

16:20 - 17:00
Prof. Behcet Sarikaya, University of Northern British Columbia,
Canada

“Nomadic User Approach to Building Mobile Wireless Sensor Networks”


17:00 - 17:40 Ass. Prof. Hoon Lee,
Changwon National University, Korea
3

Policy-based QoS Framework for Multi-Service IP Network”

17:40 - 18:05 Dr. Tomohiko YAGYU, System Platforms Research Laboratories, NEC,
Japan

“Reliability Management in Mobile Ad Hoc Networks”

18:05 - 18:30 Dr.
Kohei Ohta, Cyber Solutions Inc., Japan.
“Monitoring vehicles: the potential and the challenges”

Closing
18:30 - 20:00 Welcome Party


























4

Abstracts of Invited Talks


(A) Network Security Section:


I- Prof. Abbas Jamalipour, University of Sydney, Australia.
“Future Trends in Mobile Communications – Resource and Security Management”

Abstract: Despite huge investment in cellular mobile networks for the second- and third-generation
wireless cellular systems (2G/3G), both for infrastructure and spectrum, the recent generation of
high-speed and bandwidth demanding data applications has created new activities in standardization of
new systems. This has been accelerated mainly due to the progress in the wireless local area network
(WLAN) standards, mainly through the IEEE 802.11 standard family, in the past few years. The ease of
use, inexpensive equipment, and scalability of the WLAN have first induced the idea of integration of this
technology with the 3G cellular technologies, naming the activities within the 3GPP on integrated
WLAN/UMTS systems. It seems that trends have now redirected into a more IEEE standard-oriented
chain that passes its path and coverage beyond the local area networks into metropolitan and wide area
networks (MAN and WAN). New standards of IEEE 802.16, 802.20, and 802.21 are going not only to
improve the high-speed mobile data communications compared with their cellular counterparts, but also
to compete with them in other applications which have been traditionally supported through cellular
systems such as voice. Management and security of these new systems while are working in parallel or in
cooperation with the traditional cellular systems open new topic for researchers.ç In this talk, the
state-of-the-art of the new proposals in mobile communications technology will be outlined and the issues
of resource management and network security will be discussed.

II- Prof. Victor O.K. Li, University of Hong Kong, P. R. China
“Security of Ad Hoc Wireless Networks”

Abstract: This presentation will discuss the security challenges in ad hoc wireless networks. Existing
solutions on the key research issues, including intrusion detection, authentication, secure routing, and key
management, will be presented.ç Our research on ad hoc network security focuses on the key
management problem, which is fundamental in providing security services for ad hoc networks. In this
presentation, our research results will be summarized. First, we describe a method of using distributed
Certificate Authority (CA) to provide security services. Next, we propose to apply forward security
technology together with distributed CAs to enhance ad hoc network security. Finally, we investigate the
5
timely distribution of Certificate Revocation Lists (CRLs) when there are distributed CAs.
III- Dr. Atsuhiro Goto, Information Sharing Platform Laboratories, NTT, Japan
“Safe and Secure Ubiquitous Communication”

Abstract: Various technologies, such as firewalls, IDS/IPS, VPN and encryptions, have been and will be
developed to overcome the network security concerns mainly for the providers and/or organizations usage.
On the other hand, the Internet has been popularized so far to be “the social necessities”, so that we,
individuals, wish to be free from the security concerns and/or the irritated phenomena in our daily usage.
“Convenient and easy” communication is always our desire, as well as “safe and secure” one is
mandatory for our daily life. E-mail is being used in a variety of Internet-based scenarios, including PCs
and mobile phones. The scope of e-mail interactions has expanded beyond families, friends, and
coworkers, reaching out to unidentified users through websites and other media, so that, individuals,
enjoying the convenience of e-mails, now suffer from incidents involving leaking of e-mail addresses.
The conditional ID technology “privango” enables users to easily set usage conditions such as the term of
validity or authorized senders based on the world’s most advanced security technologies and encryption
technologies. The prevalence of a broadband network access environment has been accompanied the
emergence of various related services. Many home appliances are beginning to be networked. Not only
personal computers, but also network-enabled appliances, such as TVs with a Web browsers, HDD
recorders, and digital videos/still cameras, are now gaining popularity among consumer appliances.
Although these network appliances technically have the ability to be accessed via a network from outside,
the lack of “easiness” and/or the complexity of current security countermeasures discourage users from
remote access to their home video recorders. The easy and convenient home gateway security capabilities,
including Dynamic firewall and IPSec-proxy adaptor, will make us free from the security concerns and
troublesome appliances setting, and give us a chance to make full use of network appliances over the
Internet.



IV- Dr. Yuji Waizumi, Tohoku University, Japan.
“A Statistical Anomaly Detection Technique based on Three Different Network Features”


Abstract: Accuracy of anomaly-based intrusion detection depends on the featuresç which describe the
state of network traffic asç numerical value. Therefore appropriate features which suited to each type of
anomalous event are needed.ç In this work, we propose three types of network features and its statistical
discriminant method to detect anomaly, demonstrate its detection accuracy.



6


(B) Wireless Networking Section:


V- Prof. Sergio Palazzo, University of Catania, Italy
“Research Issues in Satellite and Wireless Networks: Experiences and Lessons at the
University of Catania”
Abstract: In this talk an overview of the research carried out in the Wireless Networks Lab (WiNe Lab)
at the University of Catania is provided. Special emphasis is given to some results obtained in the recent
years in the areas of protocol schemes for satellite IP networks and algorithms for energy efficiency in ad
hoc and sensor networks.ç In the area of satellite networks, research stems from the evidence that
traditional transport layer flow control schemes proposed for IP networks have low performance when
satellite links are involved in the communication. As a result of an activity has been carried out in
cooperation with the Broadband and Wireless Networking Laboratory directed by prof. Akyildiz at
GeorgiaTech, a new congestion control scheme, called TCP-Peach, which outperforms other TCP
schemes for satellite networks in terms of goodput. Also report is given on efficient multicast schemes
that have been introduced for both real-time and non-real-time applications in satellite environments.ç In
the field of ad hoc networks, the problem of finding a proper trade-off between energy efficiency and
responsiveness in the discovery process among different neighbour devices in self-organizing system is
dealt with. In the talk an analytical framework is discussed, which also considers the timeliness
requirements of scenarios where data transfer has to be completed before mobile nodes, after discovering
each other, go away and get out the radio coverage.ç In the area of sensor networks, a newly introduced
integrated MAC/Routing protocol, called MACRO, is presented. This protocol achieves forwarding of
data information throughout the sensor network by exploiting the capability of tuning the transmission
power of the sensor devices. An important feature is that the proposed geographical routing protocol
requires that each node only knows its own position and the position of the destination, and consequently
it does not require location information to be exchanged in the network, thus reducing energy
consumption.

VI- Prof. Behcet Sarikaya, University of Northern British Columbia, Canada
“Nomadic User Approach to Building Mobile Wireless Sensor Networks”

Abstract: The paper presents two approaches, direct diffusion sensor networkç architecture and nomadic
user based sensor network architecture toç building wireless sensor networks. Direct diffusion represents
theç approach that has been successfully used in natural environment monitoringç and remote sensing
applications using the sensor nodes available in theç market. New approaches both in network routing
7
and application developmentç are needed to build the wireless sensor networks that are nomadic userç
centric. We explain disadvantages of the directed diffusion based networkç routing and then propose an
approach based on peer-to-peer networking.ç Next, we discuss wireless sensor network mobility. In
many sensor networkç applications, the sensors move such as in cars, on robots and on humans.ç Query
processing and data collection in mobile sensor networks can beç addressed within the context of the
connection into the Internet. We willç explain how Mobile IP can be used in order to keep the sensor
nodeç mobility transparent to the nomadic user. At the application layer, XML isç used in nomadic user
approach as both the query language and for storingç the data. A simple design is explained to natively
support XML on theç sensor nodes. It is also possible to interface this application layerç middleware to
the direct diffusion based wireless sensor networks.

VII- Ass. Prof. Hoon Lee, Changwon National University, Korea
“Policy-based QoS Framework for Multi-Service IP Network”


Abstract: In this work we elaborate on the issues of policy-based QoS framework for the multi-service IP
network. We investigate the attributes of the multi-service in the future IP network, and after that we will
propose a policy-based service architecture for the multi-service. We argue that a sophisticated policy for
the provisioning and control of IP network is prerequisite in providing customers with QoS guaranteed
services. We also illustrate the implication of the policy-based network architecture by showing some
examples for the dimensioning of link capacities in the IP network.

VIII- Dr. Tomohiko YAGYU, System Platforms Research Laboratories, NEC, Japan
“Reliability Management in Mobile Ad Hoc Networks”

Abstract: Recently, wireless network technology becomes essentialç for the Internet communication.
Wireless LAN and 3G mobile network are the major technologies. They usually provide last one hop
to the Internet. However, some applications, such as ITS inter-vehicle communication, require multi-hop
communication in the wireless network. Many techniques for wireless multi-hop communication are
proposed, and IETF is proceeding with the standardization of the mobile ad hoc network techniques that
is suitable for interconnection to the Internet. Node mobility, interference and some other factors degrade
communication reliability in the wireless network, and these characteristics are widely different due to the
situation. To achieve the reliability that various applications require, it is necessary to properly apply both
wireless network techniques and traditional reliable communication techniques in wired network. This
talk will review some wireless network techniques and protection/restoration techniques in (G)MPLS
networks, and we discuss the application of these techniques with consideration to mobile network
characteristics and communication reliability.ç
8

IX- Dr. Kohei Ohta, Cyber Solutions Inc., Japan.
“Monitoring vehicles: the potential and the challenges”

Abstract: The era of the Internet Car that is continuously connected to the Internet, is here. One of the
new areas opened up by the Internet Car is that of information collection from vehicles. This area has
tremendous potential and at the same time poses several challenges. In this work we examine the
requirements for collecting information from an Internet Car. We propose to use the Standard Network
Management Protocol for the information collection. We examine some of the operational difficulties
which are handled by extending the protocol within the standard framework. We then describe our
experience with the extended protocol, We discuss experiments with interesting applications using a
prototype of the proposed technology.