skip to main content
10.1145/1868630acmconferencesBook PagePublication PagesmswimConference Proceedingsconference-collections
Q2SWinet '10: Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSWiM '10: The 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems Bodrum Turkey October 20 - 21, 2010
ISBN:
978-1-4503-0275-3
Published:
20 October 2010
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Welcome to beautiful Bodrum!

It is indeed our great pleasure to welcome you to the 6th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks -- Q2SWinet'10, in conjunction with the 13th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2010), October 17-21, 2010.

This year's symposium continues its tradition of being a thought-provoking forum for researchers from both academia and industry to share and exchange their experiences, discuss challenges, and report the state-of-theart and in-progress research on all aspects of Quality of Service (QoS) and security for wireless and mobile networks. As symposium's Chairs, we have done our best to set up a solid technical program to foster discussion and research cross-fertilization.

The program committee accepted 12 full papers covering a variety of topics in the fields of QoS and security for wireless networks. In addition, the program includes a poster session for showcasing promising research ideas and implementations. We hope that these proceedings will serve as a valuable reference for researchers and developers.

Skip Table Of Content Section
SESSION: Quality of service in wireless broadband networks
research-article
Cross-layer approach for supporting QoS in IEEE802.11 DCF wireless LANs

We propose a cross-layer approach for supporting the quality of service (QoS) of bidirectional real-time applications in IEEE802.11 DCF WLANs. In the proposal, the class-based queueing with the priority queue (PQ) scheduler is exploited in network layer ...

research-article
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography

In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...

research-article
Putting together QoS and security in autonomic pervasive systems

Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained ...

research-article
Optimized HCCA schedulers for an IEEE 802.11e/AFDX hybrid network

This paper proposes a new HCCA scheduling scheme for AFDX (Avionics Full DupleX switched Ethernet) traffics on IEEE 802.11e Wireless LAN (WLAN). The AFDX requirements are related to the temporal constraints (end-to-end latency and jitter). Our ...

SESSION: Security architectures for wireless sensor networks
research-article
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness

In a wireless network, open and wireless communication channels set the restriction of wired connections free, because wireless signal acts as the platform of data transmission. On the other hand, the open and shared nature of wireless networks also ...

research-article
A probabilistic analysis of energy efficiency of wireless sensor network duty-cycled MAC protocols: application to S-MAC and Eco-MAC

In this paper, we are conducting a probabilistic analysis of the energy consumption of nodes of a wireless sensor network caused by the use of MAC layer protocols, to know which one is best suited to save energy. Representative examples of duty-cycled ...

research-article
Delay QoS provisioning in cognitive radio systems using adaptive modulation

The spectrum of licensees can be shared by some secondary users in cognitive radio systems. However, the secondary transmitters are limited by an interference threshold constraint which is imposed by the primary receivers in order to ensure primary ...

SESSION: Quality of service in wireless sensor networks
research-article
A pragmatic testing approach for wireless sensor networks

Applications over wireless sensor networks are growing quickly. Traditional software development tools are not well adapted to this technology. In particular, adequate testing methodologies are required. Many issues have not been formally addressed as ...

research-article
Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks

Popularity of Wireless Sensor Networks (WSNs) combined with the multimedia requirements of new applications have enabled Wireless Multimedia Sensor Networks (WMSNs) which commonly carry heterogeneous traffic. In order to deliver multiple types of ...

research-article
Live forensics framework for wireless sensor nodes using sandboxing

Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and ...

research-article
Security features of a generic sensor data acquisition system

In building automation IP based network infrastructures aim to reduce facility management costs remarkably by allowing multiple applications to use the one communication network at the same time. This open approach requires a secure and confidential ...

SESSION: Security, trust and reputation in wireless ad hoc and mesh networks
research-article
A TRNG exploiting multi-source physical data

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and ...

research-article
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks

We present SEGURA, a Bundle layer security extension for ensuring the authenticity and integrity of message bundles in Delay Tolerant Networks (DTNs). SEGURA employs probabilistic set membership constructs to amortize the cryptographic functionality of ...

research-article
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems

In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only ...

research-article
Extending P2PSIP VoIP communication for ad hoc networks

In this paper, we modify and extend the P2PSIP's leading draft (RELOAD) in order to both adjust its operation better with respect to the properties of wireless ad hoc networks and improve the provided security level. In terms of security, a public/...

Contributors
  • University of California, Los Angeles
  • Politecnico di Milano
  • Paris-Saclay University

Index Terms

  1. Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          Q2SWinet '10 Paper Acceptance Rate 16 of 54 submissions, 30%;
          Overall Acceptance Rate 46 of 131 submissions, 35%
          YearSubmittedAcceptedRate
          Q2SWinet '22471634%
          Q2SWinet '14301447%
          Q2SWinet '10541630%
          Overall1314635%