Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou
{"title":"Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set","authors":"Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou","doi":"10.1109/IMIS.2015.33","DOIUrl":"https://doi.org/10.1109/IMIS.2015.33","url":null,"abstract":"As a special kind of attack, the node compromise attack destroy security, reliability and confidentiality of ad-hoc networks. However, previous research paid little attention on developing general attacking models, which are fundamentals for designing network security mechanisms. In this paper, we approach node compromise attack formalizing problem from an adversarial view and present a general attacking model based on invading virtual backbones of network, which is constructed based on Weakly Connected Dominating Set (WCDS). To investigate the features of our scheme, simulations are conducted to illustrate the influences of infection ratio to network performance. Analysis and simulations results showed that bigger infection ratio can reduce set of compromised nodes, enhance attacking efficiency, save resource expenditure and shorten attacking time.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Use of Information Technology Teaching for Kindergarten Education","authors":"Yen-Tsung Lin, Hsing-Chung Chun, S. Chuang","doi":"10.1109/IMIS.2015.92","DOIUrl":"https://doi.org/10.1109/IMIS.2015.92","url":null,"abstract":"In this paper, the application of Information Technology (IT) was designed to improve the methods in the implementation process encountered difficulties and reactions for kindergarten teachers teaching their courses. Exploration results from three problems provide the practitioners and researchers as below. First, how kindergarten teachers apply IT into the teaching model? Second, how to solve problems encountered on when the IT applied into teaching? Third, how deal with some abnormal reactions from the children on when IT is applied into teaching? Case study method is adopted in this paper. A kindergarten from Nantou County, Taiwan, is chose as the research object named 'S kindergarten'. The data collection methods consist of observation, interviews and questionnaires. Since the main scope of the study focused on teaching activities, other information regarding as environmental issues will fail to investigate at the same time. Therefore, it could not be understood the whole features of IT applications adopted in kindergarten. In the future work, the relevant topics could be explored more deeply.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tharoeun Thap, Yunyoung Nam, Heewon Chung, Jinseok Lee
{"title":"Simplified 3D Hologram Heart Activity Monitoring Using a Smartphone","authors":"Tharoeun Thap, Yunyoung Nam, Heewon Chung, Jinseok Lee","doi":"10.1109/IMIS.2015.87","DOIUrl":"https://doi.org/10.1109/IMIS.2015.87","url":null,"abstract":"In this paper, we use smartphone's built-in camera with flash light to obtain the pulsatile signal from fingertip and then apply the peak detection algorithm to detect the pulse's peaks and after that calculate the R-R interval (RRI) in real time. We design the animated heart images that beat according to each RRI of the pulsatile signal. At the same time, we make a simple pyramid hologram from a transparent film to show the beating heart above the smartphone screen in three-dimensional view. By doing this, people can actually see their heart is beating artificially rather than to see the pulsatile signal graphically.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaobing Liang, Baojiang Cui, Yin-Jun Lv, Yilun Fu
{"title":"Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set","authors":"Xiaobing Liang, Baojiang Cui, Yin-Jun Lv, Yilun Fu","doi":"10.1109/IMIS.2015.40","DOIUrl":"https://doi.org/10.1109/IMIS.2015.40","url":null,"abstract":"The security defect detection technology based on source code usually makes use of static analysis methods to detect security vulnerabilities in the test software, which does not consider the runtime information of program execution and the interaction information with the program runtime surrounding environment, so the security defect detection technology based on source code usually results in higher false positive rate. The binary program vulnerability detection methods based upon dynamic analysis usually have lower false positive rate, but their effectiveness depends entirely on test case generation, the detection efficiency of dynamic analysis based on binary program is lower. Moreover, the research of source code vulnerability detection technique and binary executable vulnerability detection technique are essentially fragmented, without considering the relationship between the two classes of methods. In order to improve the efficiency for source code and binary executables vulnerability detection, we presents a collaborative analysis method for vulnerability detection of source code and binary executables based upon the unified defect mode set, meanwhile, we verify the effectiveness of our method using a concrete example in this paper.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care","authors":"Ching-Kan Lo, Ye-Chi Wu, Cheng-Hung Chuang, Hsing-Chung Chen","doi":"10.1109/IMIS.2015.89","DOIUrl":"https://doi.org/10.1109/IMIS.2015.89","url":null,"abstract":"The poor functionality, high cost, complexity of the electronic health record (EHR) and the poor integration of the traditional Hospital Information System (HIS) have been a challenging task for an efficient clinical workflow Methods and Participants. The study was conducted from the perspective on the hospital's staffs, which including doctors, nurses and clinical information technology (CIT) engineers, and patients' caregivers (usually the family member of the patient or the special caregiver hired by the patient) upon patients receiving joint replacement. Both quantitative and qualitative analyses were performed. Comparison of the functions, features and the overall satisfaction score of questionnaire on the proposed mobile medical information system (MMIS) and Traditional HIS/EHR showed that MMIS is more superior than traditional HIS/EHR. With the limited function of the traditional HIS/EHR, MMIS may be helpful for acquiring the second opinion from different specialists to the primary care providers in particular for time demanding or life threatening diseases. Further study within a larger sample size is needed to determine the extent of the benefits of the system on other type of surgical patients'.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyun-lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim
{"title":"The Behavior-Based Analysis Techniques for HTML5 Malicious Features","authors":"Hyun-lock Choo, Sanghwan Oh, Jonghun Jung, Hwankuk Kim","doi":"10.1109/IMIS.2015.67","DOIUrl":"https://doi.org/10.1109/IMIS.2015.67","url":null,"abstract":"HTML5 announced in October 2014 contains many more functions than previous HTML versions. It includes the media controls of audio, video, canvas, etc., and it is designed to access the browser file system through the Java Script API such as the web storage and file reader API. In addition, it provides the powerful functions to replace existing active X. As the HTML5 standard is adopted, the conversion of web services to HTML5 is being carried out all over the world. The browser developers particularly have high expectation for HTML5 as it provides many mobile functions. However, as there is much expectation of HTML5, the damage of malicious attacks using HTML5 is also expected to be large. The script, which is the key to HTML5 functions, is a different type from existing malware attacks as a malicious attack can be generated merely by only a user accessing a browser. The existing known attacks can also be reused by bypassing the detection systems through the new HTML5 elements. This paper intends to define the unique HTML5 behavior data through the browser execution data and to propose the detection of malware by categorizing the malicious HTML5 features.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passive Storage Based Wireless Network Resource Management for 4G LTE","authors":"Ran Tao, Wen’an Zhou, Xuhui Yang, Guanglin Han","doi":"10.1109/IMIS.2015.41","DOIUrl":"https://doi.org/10.1109/IMIS.2015.41","url":null,"abstract":"With the development of the wireless network technology and the smart mobile terminals, some new types of OTT services emerged. These OTT services have high data volume, requires many wireless radio resouces to transmit, which caused the network to be heavily loaded and unable to guarantee the QoE for other services. In order to meet the challenge, we proposed Passive Storage Based Wireless Network Resource Management architecture in the paper. This architecture makes use of the QoE properties of the new services types and balance the network load through time domain by storing the service data and transmit them to the UEs during the low load periods. As a result, the network load caused by the new OTT services is averaged though the time dimension and therefore relived the pressure the OTT services brought to the network. By our calculation and analysis, after implement the architecture, we could balance network load through time dimension as well as increase network capacity. What's more, with the development and the growth of new types of OTT services, the architecture could benefit the network even more.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Threats Measurement Model for Reducing Cloud Computing Security Risk","authors":"Sen-Tarng Lai, Fang-Yie Leu","doi":"10.1109/IMIS.2015.64","DOIUrl":"https://doi.org/10.1109/IMIS.2015.64","url":null,"abstract":"Cloud computing is the trend of information resources sharing and also an important tool for enterprises or organizations to enhance competitiveness. Users have the flexibility to adjust request and configuration. However, network security and resource sharing issues have continued to threaten the operation of cloud computing, making cloud computing security encounter serious test. How to evaluate cloud computing security has become a topic worthy of further exploration. Combining system, management and technique three levels security factors, this paper proposes a Security Threats Measurement Model (STMM). Applying the STMM, security of cloud computing system environment can be effectively evaluated and cloud computing security defects and problems can be concretely identified. Based on the evaluation results, the user can choice the higher security service provider or request the service provider security improvement actions.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa
{"title":"A Survey of Hardware Features in Modern Browsers: 2015 Edition","authors":"Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa","doi":"10.1109/IMIS.2015.72","DOIUrl":"https://doi.org/10.1109/IMIS.2015.72","url":null,"abstract":"Recently, Java Script with HTML5 has become popular for building Website. As a side effect, those technologies can be used to collect a so-called fingerprint that contains hardware information, such as battery status or screen size, of the browser device. A Web server can collect this information without the user's agreement. Our studies show that we can also collect information that could not be obtained with existing fingerprinting, e.g., The number of CPU cores, hard disk space, and so on. In this paper, we report the various kinds of information that can be collected by using Java Script with an HTML5 API.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133135249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Applications in Mobile Sink of Wireless Sensor Networks","authors":"Chia-Hsin Cheng, Yeong-Long Shiue, Wei-Chia Lo, Hsing-Chung Chen","doi":"10.1109/IMIS.2015.58","DOIUrl":"https://doi.org/10.1109/IMIS.2015.58","url":null,"abstract":"The paper uses Zigbee wireless sensor networks to implement Context awareness through measuring the RSSI values for position. To decrease the situation of sensor failure, it is used low consumption in Zigbee wireless sensor networks. Since the transmission range of each sensor node is limited for low consumption, the transmission distance would be constrained severely. Thus, we propose that the mobile data collection device is used to collect each node's data and then aggregate data to the host side. We use RSSI indicator of each nodes to judge the relative position of this mobile sink to make context-aware services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}