Welcome to beautiful Bodrum!
It is indeed our great pleasure to welcome you to the 6th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks -- Q2SWinet'10, in conjunction with the 13th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2010), October 17-21, 2010.
This year's symposium continues its tradition of being a thought-provoking forum for researchers from both academia and industry to share and exchange their experiences, discuss challenges, and report the state-of-theart and in-progress research on all aspects of Quality of Service (QoS) and security for wireless and mobile networks. As symposium's Chairs, we have done our best to set up a solid technical program to foster discussion and research cross-fertilization.
The program committee accepted 12 full papers covering a variety of topics in the fields of QoS and security for wireless networks. In addition, the program includes a poster session for showcasing promising research ideas and implementations. We hope that these proceedings will serve as a valuable reference for researchers and developers.
Proceeding Downloads
Cross-layer approach for supporting QoS in IEEE802.11 DCF wireless LANs
We propose a cross-layer approach for supporting the quality of service (QoS) of bidirectional real-time applications in IEEE802.11 DCF WLANs. In the proposal, the class-based queueing with the priority queue (PQ) scheduler is exploited in network layer ...
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Putting together QoS and security in autonomic pervasive systems
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained ...
Optimized HCCA schedulers for an IEEE 802.11e/AFDX hybrid network
This paper proposes a new HCCA scheduling scheme for AFDX (Avionics Full DupleX switched Ethernet) traffics on IEEE 802.11e Wireless LAN (WLAN). The AFDX requirements are related to the temporal constraints (end-to-end latency and jitter). Our ...
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness
In a wireless network, open and wireless communication channels set the restriction of wired connections free, because wireless signal acts as the platform of data transmission. On the other hand, the open and shared nature of wireless networks also ...
A probabilistic analysis of energy efficiency of wireless sensor network duty-cycled MAC protocols: application to S-MAC and Eco-MAC
In this paper, we are conducting a probabilistic analysis of the energy consumption of nodes of a wireless sensor network caused by the use of MAC layer protocols, to know which one is best suited to save energy. Representative examples of duty-cycled ...
Delay QoS provisioning in cognitive radio systems using adaptive modulation
The spectrum of licensees can be shared by some secondary users in cognitive radio systems. However, the secondary transmitters are limited by an interference threshold constraint which is imposed by the primary receivers in order to ensure primary ...
A pragmatic testing approach for wireless sensor networks
Applications over wireless sensor networks are growing quickly. Traditional software development tools are not well adapted to this technology. In particular, adequate testing methodologies are required. Many issues have not been formally addressed as ...
Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks
Popularity of Wireless Sensor Networks (WSNs) combined with the multimedia requirements of new applications have enabled Wireless Multimedia Sensor Networks (WMSNs) which commonly carry heterogeneous traffic. In order to deliver multiple types of ...
Live forensics framework for wireless sensor nodes using sandboxing
Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and ...
Security features of a generic sensor data acquisition system
In building automation IP based network infrastructures aim to reduce facility management costs remarkably by allowing multiple applications to use the one communication network at the same time. This open approach requires a secure and confidential ...
A TRNG exploiting multi-source physical data
In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and ...
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
We present SEGURA, a Bundle layer security extension for ensuring the authenticity and integrity of message bundles in Delay Tolerant Networks (DTNs). SEGURA employs probabilistic set membership constructs to amortize the cryptographic functionality of ...
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems
In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only ...
Extending P2PSIP VoIP communication for ad hoc networks
In this paper, we modify and extend the P2PSIP's leading draft (RELOAD) in order to both adjust its operation better with respect to the properties of wireless ad hoc networks and improve the provided security level. In terms of security, a public/...
Index Terms
- Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Q2SWinet '22 | 47 | 16 | 34% |
Q2SWinet '14 | 30 | 14 | 47% |
Q2SWinet '10 | 54 | 16 | 30% |
Overall | 131 | 46 | 35% |