The 2005 Sendai International Workshop

on

Network Security and Wireless Communications

Following the great success achieved in the past two workshops, we are pleased to inform you that Sendai will be hosting for the third time the 2005 Sendai International Workshop. The workshop will be held at the Hotel Sendai Plaza on 27th January 2005. The scope of the 2005 workshop is focused on recent and future trends in network security and wireless communication technologies. Distinguished professors from overseas will be presenting their pioneering contributions in the wireless and security areas. The workshop is annually sponsored by the Japanese Ministry of Education, Culture, Sports, Science and Technology as a part of the Sendai Cyber-Forest Project.

Date: Thursday, January 27, 2005 13:00 ~18:30

Avenue: Hotel Sendai Plaza, 2nd Floor, Room AOI

Sponsors:

Sendai Cyber-Forest Project (Supported by the Ministry of Education, Culture, Sports, Science and Technology.)

Organizers:

l  Nemoto laboratory, Graduate School of Information Sciences, Tohoku Univ.

l  Kato laboratory, Graduate School of Information Sciences, Tohoku Univ.

For further information, please visit

http://www.it.ecei.tohoku.ac.jp/~kato/

The 2005 Sendai International Workshop Program

Jan. 27th, 2005 13:00 - 18:30

13:00 - 13:10 Professor Yoshiaki Nemoto, Tohoku University, Japan

“Opening Address”

13:10 - 13:50 Prof. Abbas Jamalipour, University of Sydney, Australia.

“Future Trends in Mobile Communications – Resource and Security Management”

13:50 - 14:30 Prof. Victor O.K. Li, University of Hong Kong, P. R. China

“Security of Ad Hoc Wireless Networks”

14:30 - 14:55 Dr. Atsuhiro Goto, Information Sharing Platform Laboratories, NTT, Japan

“Safe and Secure Ubiquitous Communication”

14:55 - 15:20 Dr. Yuji Waizumi, Tohoku University, Japan.

“A Statistical Anomaly Detection Technique based on Three Different Network Features”

15:20 - 15:40 COFFEE BREAK

15:40 – 16:20 Prof. Sergio Palazzo, University of Catania, Italy

“Research Issues in Satellite and Wireless Networks: Experiences and Lessons at the University of Catania”

16:20 - 17:00 Prof. Behcet Sarikaya, University of Northern British Columbia, Canada

“Nomadic User Approach to Building Mobile Wireless Sensor Networks”

17:00 - 17:40 Ass. Prof. Hoon Lee, Changwon National University, Korea

“Policy-based QoS Framework for Multi-Service IP Network”

17:40 - 18:05 Dr. Tomohiko YAGYU, System Platforms Research Laboratories, NEC, Japan

“Reliability Management in Mobile Ad Hoc Networks”

18:05 - 18:30 Dr. Kohei Ohta, Cyber Solutions Inc., Japan.

“Monitoring vehicles: the potential and the challenges”

Closing

18:30 - 20:00 Welcome Party

Abstracts of Invited Talks

(A) Network Security Section:

I- Prof. Abbas Jamalipour, University of Sydney, Australia.

“Future Trends in Mobile Communications – Resource and Security Management”

Abstract: Despite huge investment in cellular mobile networks for the second- and third-generation wireless cellular systems (2G/3G), both for infrastructure and spectrum, the recent generation of high-speed and bandwidth demanding data applications has created new activities in standardization of new systems. This has been accelerated mainly due to the progress in the wireless local area network (WLAN) standards, mainly through the IEEE 802.11 standard family, in the past few years. The ease of use, inexpensive equipment, and scalability of the WLAN have first induced the idea of integration of this technology with the 3G cellular technologies, naming the activities within the 3GPP on integrated WLAN/UMTS systems. It seems that trends have now redirected into a more IEEE standard-oriented chain that passes its path and coverage beyond the local area networks into metropolitan and wide area networks (MAN and WAN). New standards of IEEE 802.16, 802.20, and 802.21 are going not only to improve the high-speed mobile data communications compared with their cellular counterparts, but also to compete with them in other applications which have been traditionally supported through cellular systems such as voice. Management and security of these new systems while are working in parallel or in cooperation with the traditional cellular systems open new topic for researchers. In this talk, the state-of-the-art of the new proposals in mobile communications technology will be outlined and the issues of resource management and network security will be discussed.

II- Prof. Victor O.K. Li, University of Hong Kong, P. R. China

“Security of Ad Hoc Wireless Networks”

Abstract: This presentation will discuss the security challenges in ad hoc wireless networks. Existing solutions on the key research issues, including intrusion detection, authentication, secure routing, and key management, will be presented. Our research on ad hoc network security focuses on the key management problem, which is fundamental in providing security services for ad hoc networks. In this presentation, our research results will be summarized. First, we describe a method of using distributed Certificate Authority (CA) to provide security services. Next, we propose to apply forward security technology together with distributed CAs to enhance ad hoc network security. Finally, we investigate the timely distribution of Certificate Revocation Lists (CRLs) when there are distributed CAs.

III- Dr. Atsuhiro Goto, Information Sharing Platform Laboratories, NTT, Japan

“Safe and Secure Ubiquitous Communication”

Abstract: Various technologies, such as firewalls, IDS/IPS, VPN and encryptions, have been and will be developed to overcome the network security concerns mainly for the providers and/or organizations usage. On the other hand, the Internet has been popularized so far to be “the social necessities”, so that we, individuals, wish to be free from the security concerns and/or the irritated phenomena in our daily usage. “Convenient and easy” communication is always our desire, as well as “safe and secure” one is mandatory for our daily life. E-mail is being used in a variety of Internet-based scenarios, including PCs and mobile phones. The scope of e-mail interactions has expanded beyond families, friends, and coworkers, reaching out to unidentified users through websites and other media, so that, individuals, enjoying the convenience of e-mails, now suffer from incidents involving leaking of e-mail addresses. The conditional ID technology “privango” enables users to easily set usage conditions such as the term of validity or authorized senders based on the world’s most advanced security technologies and encryption technologies. The prevalence of a broadband network access environment has been accompanied the emergence of various related services. Many home appliances are beginning to be networked. Not only personal computers, but also network-enabled appliances, such as TVs with a Web browsers, HDD recorders, and digital videos/still cameras, are now gaining popularity among consumer appliances. Although these network appliances technically have the ability to be accessed via a network from outside, the lack of “easiness” and/or the complexity of current security countermeasures discourage users from remote access to their home video recorders. The easy and convenient home gateway security capabilities, including Dynamic firewall and IPSec-proxy adaptor, will make us free from the security concerns and troublesome appliances setting, and give us a chance to make full use of network appliances over the Internet.

IV- Dr. Yuji Waizumi, Tohoku University, Japan.

“A Statistical Anomaly Detection Technique based on Three Different Network Features”

Abstract: Accuracy of anomaly-based intrusion detection depends on the features which describe the state of network traffic as numerical value. Therefore appropriate features which suited to each type of anomalous event are needed. In this work, we propose three types of network features and its statistical discriminant method to detect anomaly, demonstrate its detection accuracy.

(B) Wireless Networking Section:

V- Prof. Sergio Palazzo, University of Catania, Italy

“Research Issues in Satellite and Wireless Networks: Experiences and Lessons at the University of Catania”

Abstract: In this talk an overview of the research carried out in the Wireless Networks Lab (WiNe Lab) at the University of Catania is provided. Special emphasis is given to some results obtained in the recent years in the areas of protocol schemes for satellite IP networks and algorithms for energy efficiency in ad hoc and sensor networks. In the area of satellite networks, research stems from the evidence that traditional transport layer flow control schemes proposed for IP networks have low performance when satellite links are involved in the communication. As a result of an activity has been carried out in cooperation with the Broadband and Wireless Networking Laboratory directed by prof. Akyildiz at GeorgiaTech, a new congestion control scheme, called TCP-Peach, which outperforms other TCP schemes for satellite networks in terms of goodput. Also report is given on efficient multicast schemes that have been introduced for both real-time and non-real-time applications in satellite environments. In the field of ad hoc networks, the problem of finding a proper trade-off between energy efficiency and responsiveness in the discovery process among different neighbour devices in self-organizing system is dealt with. In the talk an analytical framework is discussed, which also considers the timeliness requirements of scenarios where data transfer has to be completed before mobile nodes, after discovering each other, go away and get out the radio coverage. In the area of sensor networks, a newly introduced integrated MAC/Routing protocol, called MACRO, is presented. This protocol achieves forwarding of data information throughout the sensor network by exploiting the capability of tuning the transmission power of the sensor devices. An important feature is that the proposed geographical routing protocol requires that each node only knows its own position and the position of the destination, and consequently it does not require location information to be exchanged in the network, thus reducing energy consumption.

VI- Prof. Behcet Sarikaya, University of Northern British Columbia, Canada

“Nomadic User Approach to Building Mobile Wireless Sensor Networks”

Abstract: The paper presents two approaches, direct diffusion sensor network architecture and nomadic user based sensor network architecture to building wireless sensor networks. Direct diffusion represents the approach that has been successfully used in natural environment monitoring and remote sensing applications using the sensor nodes available in the market. New approaches both in network routing and application development are needed to build the wireless sensor networks that are nomadic user centric. We explain disadvantages of the directed diffusion based network routing and then propose an approach based on peer-to-peer networking. Next, we discuss wireless sensor network mobility. In many sensor network applications, the sensors move such as in cars, on robots and on humans. Query processing and data collection in mobile sensor networks can be addressed within the context of the connection into the Internet. We will explain how Mobile IP can be used in order to keep the sensor node mobility transparent to the nomadic user. At the application layer, XML is used in nomadic user approach as both the query language and for storing the data. A simple design is explained to natively support XML on the sensor nodes. It is also possible to interface this application layer middleware to the direct diffusion based wireless sensor networks.

VII- Ass. Prof. Hoon Lee, Changwon National University, Korea

“Policy-based QoS Framework for Multi-Service IP Network”

Abstract: In this work we elaborate on the issues of policy-based QoS framework for the multi-service IP network. We investigate the attributes of the multi-service in the future IP network, and after that we will propose a policy-based service architecture for the multi-service. We argue that a sophisticated policy for the provisioning and control of IP network is prerequisite in providing customers with QoS guaranteed services. We also illustrate the implication of the policy-based network architecture by showing some examples for the dimensioning of link capacities in the IP network.

VIII- Dr. Tomohiko YAGYU, System Platforms Research Laboratories, NEC, Japan

“Reliability Management in Mobile Ad Hoc Networks”

Abstract: Recently, wireless network technology becomes essential for the Internet communication. Wireless LAN and 3G mobile network are the major technologies. They usually provide last one hop to the Internet. However, some applications, such as ITS inter-vehicle communication, require multi-hop communication in the wireless network. Many techniques for wireless multi-hop communication are proposed, and IETF is proceeding with the standardization of the mobile ad hoc network techniques that is suitable for interconnection to the Internet. Node mobility, interference and some other factors degrade communication reliability in the wireless network, and these characteristics are widely different due to the situation. To achieve the reliability that various applications require, it is necessary to properly apply both wireless network techniques and traditional reliable communication techniques in wired network. This talk will review some wireless network techniques and protection/restoration techniques in (G)MPLS networks, and we discuss the application of these techniques with consideration to mobile network characteristics and communication reliability.

IX- Dr. Kohei Ohta, Cyber Solutions Inc., Japan.

“Monitoring vehicles: the potential and the challenges”

Abstract: The era of the Internet Car that is continuously connected to the Internet, is here. One of the new areas opened up by the Internet Car is that of information collection from vehicles. This area has tremendous potential and at the same time poses several challenges. In this work we examine the requirements for collecting information from an Internet Car. We propose to use the Standard Network Management Protocol for the information collection. We examine some of the operational difficulties which are handled by extending the protocol within the standard framework. We then describe our experience with the extended protocol, We discuss experiments with interesting applications using a prototype of the proposed technology.

1