{"title":"Zigbee Security within the Framework of IoT","authors":"Wissam Razouk","doi":"10.1109/SOCA.2014.57","DOIUrl":"https://doi.org/10.1109/SOCA.2014.57","url":null,"abstract":"The latest version of ZigBee offers improvement over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist as the enhanced protocol still has many security weaknesses. In this presentation we highlight relevant security concerns related to the latest ZigBee security features, then we propose countermeasure mechanisms to address some of these weaknesses. We also propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution improves security and decreases considerably the likelihood of successful attacks. Lastly we discuss the security and performance related to the proposed scheme.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection Algorithm for Localized Abnormal Weather Using Low-Cost Wireless Sensor Nodes","authors":"T. Otsuka, Yoshitaka Torii, Takayuki Ito","doi":"10.1109/SOCA.2014.34","DOIUrl":"https://doi.org/10.1109/SOCA.2014.34","url":null,"abstract":"In recent years, we have witnessed an unpresented increase localized heavy weather phenomena such as tornadoes and localized heavy rain which can not be expected by the conventional weather forecast system. However, the number of observation posts is few little for forecasting for tornadoes and heavy rain. It is necessary to increase dramatically the observation points in order to perform ware correct prediction using real data. We have developed a compact and low-cost pressure information acquisition system, to detect the signs of localized abnormal weather. This research proposes an algorithm to predict local weather by detecting anomalous pressure values in the time series of the pressure sensor information, and then to notify users.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132547247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Context Aware Decision Making Aid by Behavioral Characteristic","authors":"M. Nakasumi","doi":"10.1109/SOCA.2014.38","DOIUrl":"https://doi.org/10.1109/SOCA.2014.38","url":null,"abstract":"Smartphone users are known by their needs for very specific information about one or more subjects depended on their location. The rapidly increasing number of smartphone users who use location based contents. It is difficult to find how users make purchase decisions in such situation. A unique characteristic of mobile environment is that they allow retails to create marketing context with location. A desirable recommendation from a consumer perspective is better implementation of sophisticated decision aid to assist consumers in their purchase decisions by providing the recommendation mechanism to their individual preferences. To characterize user's profiles and offer them new contents and resources is one of our main challenges. In this paper, a context aware decision aid is described, which proposes a Case-based Context Aware system for identifying user's context. This system enables contents to broaden user's profiles beyond the information that users have introduced by hand. This paper also shows the nature of the effects that the context aware decision aid may have on consumer decision making in pervasive environment, designed to assist users in performing one of the above tasks, on purchase decision making in pervasive environment.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BPEL Conformance in Open Source Engines: The Case of Static Analysis","authors":"Simon Harrer, C. Preißinger, G. Wirtz","doi":"10.1109/SOCA.2014.49","DOIUrl":"https://doi.org/10.1109/SOCA.2014.49","url":null,"abstract":"In 2007, OASIS finalized their Business Process Execution Language 2.0 (BPEL) specification which defines an XML-based language for building orchestrations of Web Services. As the validation of BPEL processes against the official BPEL XML schema leaves room for a plethora of static errors, the specification contains 94 static analysis rules to cover all static errors. According to the specification, any violations of these rules are to be checked by a standard conformant engine at deployment time. When a violation is not detected in BPEL processes during deployment, such errors remain unnoticed until runtime, making them expensive to find and fix. In this work, we investigate whether mature BPEL engines that claimed standard conformance implement these static rules. To answer this question, we formalize the static rules and derive test cases based on these formalizations to evaluate the degree of support for static analysis of six open source BPEL engines using the BPEL Engine Test System (betsy). In addition, we propose a method to get more accurate static analysis conformance results by taking the feature conformance of engines into account to exclude false positives in contrast to the classic approach. The results reveal that support for static analysis in these engines varies greatly, ranging from nonexistent to full support. Furthermore, our proposed method outperforms the classic one in terms of accuracy.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115614796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yun-An Chang, Ming-Shing Chen, Jong-Shian Wu, Bo-Yin Yang
{"title":"Postquantum SSL/TLS for Embedded Systems","authors":"Yun-An Chang, Ming-Shing Chen, Jong-Shian Wu, Bo-Yin Yang","doi":"10.1109/SOCA.2014.23","DOIUrl":"https://doi.org/10.1109/SOCA.2014.23","url":null,"abstract":"The \"the internet of things\" will require security in fracture on small devices. This task is made more difficult as large quantum computers may appear soon and break currently standard PKCs (public-key cryptosystems). In anticipation, PKCs which can survive quantum computing (\"post quantum cryptosystems\", or PQCs) are actively being studied. However, effort put into building infrastructure for PQCs has been insufficient, in particular w.r.t. The lack a comprehensive library with a quantum-computing-resilient option for each public-key task. We present such a post quantum SSL/TLS library using publicly available parameters. We adapted this library from Polar SSL rather than the more popular Open SSL because it was a much cleaner code base to work from. We have also refactored the original Polar SSL code base to facilitate the incorporation of future cryptosystems. While testing is yet incomplete, both throughput and code size seem reasonable, facilitating adoption in resource-limited devices.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121801298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Collaborative Context Reasoning in IoT Based Intelligent Care Services","authors":"Chao-Lin Wu, Chuang-Wen You, Chun-Yuan Chen, Ching-Chih Chuang, Tsung-Chi Chiang","doi":"10.1109/SOCA.2014.18","DOIUrl":"https://doi.org/10.1109/SOCA.2014.18","url":null,"abstract":"Most of existing commercial IoT devices do not collaborate with one another yet, and it is also challenging to develop intelligent care services (ICS) to satisfy user needs while minimizing user inconvenience due to multiple sources of changing contexts. In this study, we demonstrate our concept of IoT-based collaborative context reasoning in a setting of a smart kitchen environment, where a smart kitchen cabinet providing ICS is designed. We prototyped a smart kitchen stand deployed with sensors and actuators controlled by Intel Galileo boards. Based on a flexible M2M platform, i.e., WuKong, an IoT-based service application was composed. Results show that our system can correctly infer contexts through collaborative sensors and according to these contexts proactively react to enable/disable actuators to ensure kitchen safety or provide occupants convenience based on provided usage model of occupants.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Heuristics with Data Rounding for Combinatorial Food Packing Problems","authors":"Y. Karuno, Kenju Tateishi","doi":"10.1109/SOCA.2014.15","DOIUrl":"https://doi.org/10.1109/SOCA.2014.15","url":null,"abstract":"Given a set I = {i | i = 1, 2, . . . , n} of current n items (for example, n green peppers) with their weights w<sub>i</sub> and priorities r<sub>i</sub>, a lexicographic bi-criteria combinatorial food packing problem asks to find a subset I' (⊆ I) so that the total weight Σ<sub>i∈I'</sub> w<sub>i</sub> is no less than a specified target bound b for each package, and it is minimized as the primary objective, and further the total priority Σ<sub>i∈I'</sub> r<sub>i</sub> is maximized as the second objective. The problem has been known to be NP-hard, while it can be solved exactly in O(nb) time if all the input data are assumed to be integral. For a given real ε > 0, an O(n<sup>2</sup>/ε) time heuristic algorithm with a data rounding technique has been designed and the heuristic total weight has been shown to be at most (2+ε) times the optimal total weight. In this paper, a modification of the data rounding heuristic is proposed, and it is shown that the proposed modification delivers a heuristic solution such that the total weight is at most (1 + ε) times the optimum.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute Based Service Customization and Selection","authors":"Jun Yan, Hao Gao, Y. Mu","doi":"10.1109/SOCA.2014.12","DOIUrl":"https://doi.org/10.1109/SOCA.2014.12","url":null,"abstract":"In a highly competitive global service market, service consumers tend to select a provider from a large pool of functionally equivalent services based on Quality of Service (QoS). To gain competitive advantages, it is desirable for a service provider to adopt service customization, particularly QoS customization, as one of the key strategies to differentiate itself from the competitors. This, however, has raised new challenges in describing and publishing QoS information, identifying users, and adjusting QoS offerings. This research borrows the concept of attribute based access control and presents an attribute based service customization model. The attribute based access control policy language is extended to enable definition of QoS customization rules. An algorithm is proposed to support consumer identification and QoS customization. This paper also discusses a case study to illustrate the proposed approach.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Shih, Kwei-Jay Lin, Jyun-Jhe Chou, Ching-Chih Chuang
{"title":"Autonomous Service Management for Location and Context Aware Service","authors":"C. Shih, Kwei-Jay Lin, Jyun-Jhe Chou, Ching-Chih Chuang","doi":"10.1109/SOCA.2014.10","DOIUrl":"https://doi.org/10.1109/SOCA.2014.10","url":null,"abstract":"Self-Management of services and devices in Internet of Things (IoT) systems and Machine-to-Machine (M2M) systems is a fundamental challenge due to the large number of devices and context-aware services. In this paper, we present the mechanism to automatically manage the services and devices according to context of the system and location of the devices. The developed mechanism is parts of WuKong middleware, which is a middleware for distributed and autonomous IoT/M2M systems. To support autonomous service management, we develop the device identification mechanism, the mechanism for device status monitoring, device management, and service reconfiguration. This paper presents the location and context-aware service configuration mechanism in WuKong middleware. The mechanism includes the services to manage the devices, to manage the radio interfaces on devices, to learn the location of devices, to load the service remotely and dynamically. The developed mechanisms are implemented and experimented on Arduino-compatible devices to evaluate its performance.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 2D Indoor Positioning System Based on a Wireless Sensor Network Technology for Power Adjustable Solutions","authors":"Mikhail M. Komarov","doi":"10.1109/SOCA.2014.32","DOIUrl":"https://doi.org/10.1109/SOCA.2014.32","url":null,"abstract":"In this paper development of a 2D indoor positioning system based on a wireless sensor network (WSN) technology (Zig BeePro protocol) to use for transmission power adjustable solutions is described. This work implemented real-time system with different positioning methods and algorithms: triangulation, fingerprinting, fingerprinting with K weighted nearest neighbor algorithm. There was also implemented median filter to make the raw data smoother. The important point in this study is to compare different methods for different physical areas. Experimental results in real environment showed the difference in accuracy for different methods for different areas. With the software it is possible to configure positioning system by changing weights for different nodes in K weighted nearest neighbor algorithm. The software developed for the coordinates estimation can help determination of the points in the real area with 0 m accuracy where it is possible to set up special control devices and guarantee location of the mobile device and where it is also possible to adjust transmission power after defining the position of the mobile device.","PeriodicalId":138805,"journal":{"name":"2014 IEEE 7th International Conference on Service-Oriented Computing and Applications","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117002253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}