{"title":"A SIP-based architecture model for contextual coalition access control for ubiquitous computing","authors":"R. Liscano, Kaining Wang","doi":"10.1109/MOBIQUITOUS.2005.8","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.8","url":null,"abstract":"A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being able to access resources or services located and owned by other entities. Coalition access control encompasses control mechanisms dealing with access between users of two or more different security domains. In this paper we present an approach to add contextual information to the distributed role based access control (dRBAC) model to support spontaneous coalition. The dRBAC model is a relatively new approach for coalition access control based on a delegation model but has been targeted towards pre-arranged delegations among distributed enterprises. A delegation architecture is presented that leverages SIP communication sessions to discover delegation security managers that can automatically exchange roles and delegations based on location and communication session contexts.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Jafari, A. Encarnacao, Azad Zahoory, F. Dabiri, H. Noshadi, M. Sarrafzadeh
{"title":"Wireless sensor networks for health monitoring","authors":"R. Jafari, A. Encarnacao, Azad Zahoory, F. Dabiri, H. Noshadi, M. Sarrafzadeh","doi":"10.1109/MOBIQUITOUS.2005.65","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.65","url":null,"abstract":"We propose a platform for health monitoring using wireless sensor networks. Our platform is a new architecture called CustoMed that will reduce the customization and reconfiguration time for medical systems that use reconfigurable embedded systems. This architecture is a network enabled system that supports various wearable sensors and contains on-board general computing capabilities for executing individually tailored event detection, alerts, and network communication with various medical informatics services. The customization of such system with a large number of \"med nodes\" is extremely fast even by non-engineering staff. In this paper, we present the architecture of such device along with experimental analysis that evaluates the performance of such system.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended ZRP: a routing layer based service discovery protocol for mobile ad hoc networks","authors":"C. Ververidis, George C. Polyzos","doi":"10.1109/MOBIQUITOUS.2005.30","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.30","url":null,"abstract":"Service discovery in mobile ad hoc networks is an essential process in order for these networks to be self-configurable with zero or minimal administration overhead. In this paper we argue that service discovery can be greatly enhanced in terms of efficiency (regarding service discoverability and energy consumption), by piggybacking service information into routing layer messages. Thus, service discovery does not generate additional messages and a node requesting a service, in addition to discovering that service, it is simultaneously informed of the route to the service provider. We extended the zone routing protocol (ZRP) in order to encapsulate service information in its routing messages. Extensive simulations demonstrate the superiority of this routing layer-based service discovery scheme over that of a similar, but application layer based service discovery scheme.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114378878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contextualizing applications via semantic middleware","authors":"O. Lassila, Deepali Khushraj","doi":"10.1109/MOBIQUITOUS.2005.19","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.19","url":null,"abstract":"The use of description logics (DLs) in modeling various real-world domains, and reasoning about them, has well-known benefits. We believe that the same framework can be used for representing a user-centric view of usage contexts. A DL-reasoner can then be used for organizing context definitions, merging domain knowledge into these definitions, and performing recognition of contexts from sensor inputs. A pure DL-based approach, however, has certain limitations in a context environment; hence, a hybrid reasoning approach is proposed. To ensure syntactic and semantic interoperability, we adopt a semantic Web-compliant approach that uses the OWL-DL variant of the OWL Web ontology language. This allows us to aggregate various heterogeneous data sources, both directly in semantic Web formalisms, and indirectly via the use of a transformation framework capable of using data from legacy applications. Context and domain models, along with associated reasoners, are themselves context, user and/or organization-specific; hence multiple systems should be maintained and connected into a distributed architecture. In order to deploy this architecture in a mobile environment, an underlying SIP-based provisioning framework has been experimented with, enabling device, network and location transparency.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multivariate analysis for probabilistic WLAN location determination systems","authors":"M. Youssef, M. Abdallah","doi":"10.1109/MOBIQUITOUS.2005.41","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.41","url":null,"abstract":"WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique for enhancing the performance of WLAN location determination systems by taking the correlation between samples from the same access point into account. We show that the autocorrelation between consecutive samples from the same access point can be as high as 0.9. Giving a sequence of correlated signal strength samples from an access point, the technique estimates the user location based on the calculated probability of this sequence from the multivariate distribution. We use a linear autoregressive model to derive the multivariate distribution function for the correlated samples. Using analytical analysis, we show that the proposed technique provides better location accuracy over previous techniques especially for the highly correlated samples in a typical WLAN environment. Implementation of the technique in the Horus WLAN location determination system shows that the average system accuracy is increased by more than 64%. This significant enhancement in the accuracy of WLAN location determination systems helps increase the set of context-aware applications implemented on top of these systems.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of strategies for mitigating the sensor network hot spot problem","authors":"M. Perillo, Z. Cheng, W. Heinzelman","doi":"10.1109/MOBIQUITOUS.2005.10","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.10","url":null,"abstract":"In multi-hop wireless sensor networks that are characterized by many-to-one (converge-east) traffic patterns, problems related to energy imbalance among sensors often appear. When the transmission range is fixed for nodes throughout the network, the amount of traffic that sensors are required to forward increases dramatically as the distance to the data sink becomes smaller. Thus, sensors closest to the data sink tend to die early. Network lifetime can be improved to a limited extent by the use of a more intelligent transmission power control policy that balances the energy used in each node by requiring nodes further from the data sink to transmit over longer distances (although not directly to the data sink). Alternatively, policies such as data aggregation allow the network to operate in a more energy efficient manner. Since the deployment of an aggregator node may be significantly more expensive than the deployment of an ordinary microsensor node, there is a cost tradeoff involved in this approach. This paper provides an analysis of these policies for mitigating the sensor network hot spot problem, considering energy efficiency as well as cost efficiency.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125737554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent negotiation in ad-hoc networks","authors":"C. Carabelea, M. Berger","doi":"10.1109/MOBIQUITOUS.2005.9","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.9","url":null,"abstract":"In this paper we investigate the means to deploy on handheld devices personal agents that negotiate in Bluetooth-based ad-hoc networks. We implemented a test application called advertising on mobile phones (ADOMO), in which a personal agent executed on a handheld device, negotiates and establishes contracts with commercial agents in its neighborhood. The objects of the contracts are commercial advertisements (ads) to be displayed on the device's screen in exchange for a small benefit. We describe an implementation of this application and obtained results. The agents were deployed on both a PocketPC and a smart phone.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized optimization of dynamic Bluetooth scatternets","authors":"Sewook Jung, M. Gerla, C. K. Kallo, M. Brunato","doi":"10.1109/MOBIQUITOUS.2005.21","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.21","url":null,"abstract":"Previous work analytically showed that communication path length reduction is an efficient way for improving the performance of Bluetooth scatternets. Maintaining short communication paths is mainly important in dynamic scatternets with changing traffic flows, mobile nodes and in the presence of interference, when the network topology changes continuously. In this work we aim at demonstrating through simulations that in such dynamic scatternets by periodically reducing the path length (i.e. hop count) between the communicating nodes, the overall throughput supported by the network can be significantly increased and the available energy of nodes can be consumed more efficiently. For this purpose, we present a distributed technique for repeatedly re-configuring the scatternet topology such that to support the current traffic flows between all of the communicating peers with a small number of hops.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123852799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient processing of K nearest neighbor queries in location-aware sensor networks","authors":"J. Winter, Yingqi Xu, Wang-Chien Lee","doi":"10.1109/MOBIQUITOUS.2005.28","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.28","url":null,"abstract":"The k nearest neighbor (KNN) query, an essential query for information processing in sensor networks, has not received sufficient attention in the research community of sensor networks. In this paper, we examine in-network processing of KNN queries by proposing two alternative algorithms, namely the GeoRouting Tree (GRT) and the KNN Boundary Tree (KBT). The former is based on a distributed spatial index structure and prunes off the irrelevant nodes during query propagation. The latter is based upon ad-hoc geographic routing and first obtains a region within which at least k nearest sensor nodes are enclosed and then decides the k nearest nodes to the query point. We provide an extensive performance evaluation to study the impact of various system factors and protocol parameters. Our results show that GRT yields a good tradeoff between energy consumption and query accuracy in static scenarios. On the other hand, KBT achieves better energy efficiency while being more tolerant to network dynamics.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community-based asynchronous wakeup protocol for wireless peer-to-peer file sharing networks","authors":"A. Leung, Yu-Kwong Kwok","doi":"10.1109/MOBIQUITOUS.2005.17","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.17","url":null,"abstract":"Ubiquitous peer-to-peer (P2P) networking is widely expected to be manifested in a wireless environment in the near future. However, to realize such an interesting mobile computing platform, energy efficiency is one of the most critical resources management issues yet to be tackled. Unfortunately, energy efficient wireless P2P networking is still a relatively less explored topic as it is quite challenging to tackle the energy management problem without centralized control. In this paper, we meet this research challenge by proposing a new distributed protocol, called community-based asynchronous wakeup protocol, CAWP, for energy conservation in wireless P2P file sharing networks. Simulation results show that our proposed CAWP is found to be highly effective in that it can remarkably increase the energy efficiency of the participants in a wireless P2P system.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}