{"title":"Exploiting co-location history for efficient service selection in ubiquitous computing systems","authors":"Alexandros Karypidis, S. Lalis","doi":"10.1109/MOBIQUITOUS.2005.29","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.29","url":null,"abstract":"As the ubiquitous computing vision materializes, the number and diversity of digital elements in our environment increases. Computing capability comes in various forms and is embedded in different physical objects, ranging from miniature devices such as human implants and tiny sensor particles, to large constructions such as vehicles and entire buildings. The number of possible interactions among such elements, some of which may be invisible or offer similar functionality, is growing fast so that it becomes increasingly hard to combine or select between them. Mechanisms are thus required for intelligent matchmaking that will achieve controlled system behavior, yet without requiring the user to continuously input desirable options in an explicit manner. In this paper we argue that information about the co-location relationship of computing elements is quite valuable in this respect and can be exploited to guide automated service selection with minimal or no user involvement. We also discuss the implementation of such mechanism that is part of our runtime system for smart objects.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KTR: an efficient key management scheme for air access control","authors":"Qijun Gu, Peng Liu, Wang-Chien Lee, C. Chu","doi":"10.1109/MOBIQUITOUS.2005.33","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.33","url":null,"abstract":"To provide secure access to data in wireless broadcast services, symmetric key-based encryption is used to ensure that only users who own the valid keys can decrypt the data. In this paper, we propose an efficient key management scheme (namely KTR) to handle key distribution with regarding to complex subscription options and user activities. KTR has the following advantages. First, it supports all subscription activities in wireless broadcast services. Second, in KTR, a user only needs to hold one set of keys for all subscribed programs, instead of separate sets of keys for each program. Third, KTR identifies the minimum set of keys that must be changed to ensure broadcast security and minimize the rekey cost. Our simulations show that KTR can save about 45% of communication overhead in the broadcast channel and about 50% of decryption cost for each user, compared with conventional approaches based on logical key hierarchy.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure address auto-configuration for mobile ad hoc networks","authors":"Pan Wang, D. Reeves, P. Ning","doi":"10.1109/MOBIQUITOUS.2005.52","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.52","url":null,"abstract":"Auto-configuration provides convenience in implementing a mobile ad hoc network. However, it may sacrifice network security if there is not a reliable authentication mechanism, e.g., an attacker may spoof other nodes and hijack their traffic. In this paper, we propose a secure address auto-configuration scheme for MANET. It binds each IP address with a public key, allows a node to self-authenticate itself and thus thwarts address spoofing and other attacks associated with auto-configuration.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121774174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A feedback control scheme for resource allocation in wireless multi-hop ad hoc networks","authors":"Wenbo He, Xue Liu, K. Nahrstedt","doi":"10.1109/MOBIQUITOUS.2005.2","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.2","url":null,"abstract":"We present a new feedback control scheme for resource allocation in wireless ad hoc environment. The congestion measure on a wireless link is symbolized as a virtual price, which depends on the recent history of wireless node's queue size. The aggregate price along a route is the feedback to control the transmission rate at the source. In this way, the transmission rate adjustment will dynamically achieve efficient resource allocation, and make the queue size on wireless links stabilize around desired equilibrium. Simulation results show that the proposed scheme can not only help allocate bandwidth fairly, but also achieve the goal of optimal sharing the channel capacity among multi-hop flows.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A relay based MAC protocol to support multi-rate feature in mobile ad hoc networks","authors":"Weilin Zeng, Haixia Tan, T. Suda","doi":"10.1109/MOBIQUITOUS.2005.6","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.6","url":null,"abstract":"Multi-rate feature is an important advance in wireless communications. It enables wireless devices to operate at high data rate when the channel condition is sufficiently good. Existing ad hoc routing protocols can not perform very well in the multi-rate ad hoc networks because they generally assume that bandwidth of different links are identical in the system. One straightforward solution to this issue is to use special routing metrics in routing algorithm, which is called routing approach. However, we believe that only localized reaction is performed in response to the local event. Based on this design principle, we propose a relay based medium access scheme to employ multi-rate capability even if existing minimum-hop based routing protocols are used. This scheme takes advantage of the node residing between neighboring nodes as a relay node and transforms a long-range transmission into two short-range transmissions. In our scheme design, we are very careful in reducing the additional overhead caused in order to exploit the high data rate transmission. Simulations show that our scheme achieve better throughput compared with 802.11 MAC scheme, a rate-adaptive MAC protocol called RBAR and the routing approach.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rónai, K. Fodor, G. Biczók, Z. Turányi, A. Valkó
{"title":"MAIPAN: middleware for application interconnection in personal area networks","authors":"M. Rónai, K. Fodor, G. Biczók, Z. Turányi, A. Valkó","doi":"10.1109/MOBIQUITOUS.2005.35","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.35","url":null,"abstract":"This paper proposes a middleware that creates a dynamically changeable, but uniform computing environment for personal area networks (PANs). The middleware hides the physical scatteredness and the dynamically changing configuration of the PAN and presents its capabilities as a single computer. Using the uniform application programming interface (API) offered by the middleware, developers creating distributed applications do not have to take care of various PAN configurations or PAN dynamics. The solution provides easy set-up of PANs and transparent redirection of ongoing dataflows.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transparent heterogeneous mobile ad hoc networks","authors":"Patrick Stuedi, G. Alonso","doi":"10.1109/MOBIQUITOUS.2005.63","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.63","url":null,"abstract":"Most research on mobile ad hoc networks assumes a medium access (MAC) protocol similar to 802.11. Nevertheless, such networks can be built on top of any medium access scheme. An example are Bluetooth multi-hop networks (so called scatternets). In practice, many devices support several interfaces although the protocol stack used in each interface tends to be interface specific at the lower layers. This limits the ability of a device to switch back and forth between networks as need and opportunity dictates. As a step towards providing a more flexible handover infrastructure, in this paper we address the issue of integrating heterogeneous, mobile ad-hoc networks that use different MAC layer protocols. The goal is to provide an end-to-end communication abstraction that hides heterogeneity. In the paper, we discuss different possible designs with regard to application transparency, performance and mobility. Using these ideas, we describe an IP based heterogeneous mobile ad hoc testbed using Bluetooth and IEEE 802.11 that implements a virtual interface approach as the end-to-end abstraction. Furthermore, we also provide a detailed evaluation of the system in terms of throughput and handover-time.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personal AP protocol for mobility management in IEEE 802.11 systems","authors":"L. Zan, Jidong Wang, L. Bao","doi":"10.1109/MOBIQUITOUS.2005.46","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.46","url":null,"abstract":"In mobile wireless systems, the quest to support delay-stringent multimedia applications challenges most existing solutions to the mobility support and traffic management problems. An infrastructure supported approach is required to provide non-disrupted services with seamless roaming capabilities. We propose a mobility management scheme called personal AP, to support station mobility efficiently. In personal AP mobility support system, the mobility context of each mobile station is defined by the relevant state information at the currently associated access point, including the MAC layer association states at the access point. When the mobile station roams, the access point context follows the mobile station from one physical access point to another, thus creating the \"ghost\" access point following the mobile station and eliminating the mobile station from re-associating with new access points. Personal AP system improve the seamless roaming support by avoid the lengthy re-association process commonly seen in IEEE 802.11 systems. The essential idea of personal AP is applicable in other wireless systems as well.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Market models and pricing mechanisms in a multihop wireless hotspot network","authors":"Kai Chen, Zhenyu Yang, C. Wagener, K. Nahrstedt","doi":"10.1109/MOBIQUITOUS.2005.36","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.36","url":null,"abstract":"Multihop wireless hotspot network [A. Balachandran et al., (2003), F. Fitzek et al., (2003), Y-D. Lin et al., (1999), K-C. Wang et al., (2003)] has been recently proposed to extend the coverage area of a base station. However, with selfish nodes in the network, multihop packet forwarding cannot take place without an incentive mechanism. In this paper, we adopt the \"pay for service\" incentive model, i.e., clients pay the relaying nodes for their packet forwarding service. Our focus in this paper is to determine a \"fair\" pricing for packet forwarding. To this end, we model the system as a market where the pricing for packet forwarding is determined by demand and supply. Depending on the network communication scenario, the market models are different. We classify the network into four different scenarios and propose different pricing mechanisms for them. Our simulation results show that the pricing mechanisms are able to guide the market into an equilibrium state quickly. We also show that maintaining communication among the relaying nodes is important for a stable market pricing.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121696245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Canfora, G. D. Santo, Gabriele Venturi, E. Zimeo, Maria Vittoria Zito
{"title":"Proxy-based hand-off of Web sessions for user mobility","authors":"G. Canfora, G. D. Santo, Gabriele Venturi, E. Zimeo, Maria Vittoria Zito","doi":"10.1109/MOBIQUITOUS.2005.50","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.50","url":null,"abstract":"The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal computing. However, even if a personal device is able to access to different kinds of information, often it does not represent the best solution to retrieve a stream of data from the Internet or to visualize it with an acceptable quality. This problem is promoting several research efforts oriented to the definition of techniques and network components able to support the migration of working sessions from a device to a more apt one. Research results related to the mobility of hosts are not sufficient to solve the problem of user mobility. The paper presents a protocol built a top HTTP for enabling session hand-off in Web applications, which, by exploiting a proxy-based architecture, is able to work without interventions on existing applications and Web infrastructure.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}