Makoto Ikeda, S. Ishikawa, Taiki Honda, L. Barolli
{"title":"Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN","authors":"Makoto Ikeda, S. Ishikawa, Taiki Honda, L. Barolli","doi":"10.1109/IMIS.2015.25","DOIUrl":"https://doi.org/10.1109/IMIS.2015.25","url":null,"abstract":"In previous work, we proposed a Message Suppression (MS) method for Vehicular Delay Tolerant Networking (Vehicular-DTN) considering Epidemic routing protocol. In this paper, we evaluate our proposed MS method considering two different topologies for different DTN routing protocols. The MS method works together with Direct Delivery, Spray and Wait and Epidemic routing protocols using additional packets. The simulations for two scenarios are conducted considering obstacles (buildings), where MS with Road side units (MSRs) are present and not present. We consider 802.11p standard and send bundle messages in a grid scenario. We use the packet delivery ratio, storage usage and end-to-end delay as evaluation metrics. Based on simulation results, we found that our proposed method with Epidemic routing on X-shaped scenario has better performance compared with other DTN routing protocols.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios","authors":"Alex C. Olivieri, G. Rizzo","doi":"10.1109/IMIS.2015.55","DOIUrl":"https://doi.org/10.1109/IMIS.2015.55","url":null,"abstract":"The Internet of Things (IoT) opens new perspectives for the Machine-To-Machine communications, as it brings to settings with a large and heterogeneous set of devices. This makes integration of such diverse technologies a challenging task. A typical solution to this problem is represented by universal gateways, which provide internal semantics for protocol translation. However such approach is bound to be challenged in future IoT scenarios, as it brings substantial performance impairments in settings with very large number of devices and of technologies. We address these limitations, by proposing two novel approaches. A first is based on distributing the management of the different technologies among gateways. A second approach makes use of Web Service delegation, with gateways acting only as a connecting point between the entities and some service that can interpret the information exchanged. We implement and validate experimentally these approaches, showing that they both scale sensibly better than the traditional approach, guaranteeing acceptable performance even with a high degree of heterogeneity. Moreover, we identify the criteria which should be considered when choosing between the two proposed approaches. Our results establish a set of guidelines for integration in large and heterogeneous IoT scenarios.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Power Consumption for Smart Devices in Web Applications","authors":"Ken Nishimura, Kaoru Sugita","doi":"10.1109/IMIS.2015.12","DOIUrl":"https://doi.org/10.1109/IMIS.2015.12","url":null,"abstract":"In this study, we discuss about decreasing the power consumption of a smart devices in web applications. The decrease of the running cost and the improvement of availability are very important for the reduction of the power consumption in communication systems and services. We have conducted various experiments for power consumption by considering iOS and Android Operating Systems (OS). In this paper, we present experimental results to measure the performances of power consumption by playing the web contents and tapping the touch panel.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno
{"title":"Reliable Voice-Based Transactions over VoIP Communications","authors":"G. Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno","doi":"10.1109/IMIS.2015.20","DOIUrl":"https://doi.org/10.1109/IMIS.2015.20","url":null,"abstract":"Nowadays, plenty of sensitive transactions are provided through call centers such as bank operations, goods purchase and contracts signing. Beside communication confidentiality, two major issues are raised within this scenario: (1) each peer should be ensured about the identity of the other, (2) each peer should be guaranteed that the other could not cheat about the communication contents. Current telecommunication (TLC) networks offer (built-in) or allow several mechanisms to enhance security and reliability of human conversations, leveraging strong authentication mechanisms and cryptography. However, in most cases these solutions require complex deployments, mainly based on proprietary technologies which are often characterized by high costs and low flexibility. In this paper we present a solution for strong peers authentication and non-repudiability of human conversations through Voice over IP (VoIP) networks. Our solution achieves low costs and high interoperability as it is built on top of open standard technologies. Authentication and key-agreement mechanism are based on X.509 digital certificates and full PKCS#11 compliant cryptographic tokens. As proof of concept, we present and discuss a prototype implementation.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu
{"title":"An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi","authors":"Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu","doi":"10.1109/IMIS.2015.62","DOIUrl":"https://doi.org/10.1109/IMIS.2015.62","url":null,"abstract":"This paper presents an AP selection for indoor positioning based on Wi-Fi received signal strength (RSS), which is a low cost and easy-accessible technique. However, the RSS are changeable over time by multipath effect, which may affect the accuracy of positioning. First, the system uses the box plot to remove the outlier of the RSS samples from APs to smooth the RSS. Then, the standard deviation is used to analysis the variation of RSS, and selects the Top-N APs having less interference for location estimation. We will use simulations to further verify the positioning accuracy and efficiency of the proposed strategy, but also look forward to apply on related positioning services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge-Based Framework for the Virtual Communication of Public Art","authors":"V. Lombardo, R. Damiano, Antonio Lieto","doi":"10.1109/IMIS.2015.22","DOIUrl":"https://doi.org/10.1109/IMIS.2015.22","url":null,"abstract":"This paper deals with the documentation and communication of contemporary public art. It analyzes the specific requirements of such a form of cultural heritage and presents a system that implements the visualization of implicit information in a web -- based virtual reality environment. The core of the system is a knowledge -- based (ontological) module, devised to represent the values, the realization procedures, and the access ways to public art items. The visualization system relies upon the ontological representation to provide a 3D layout that takes into account the relevant traits that characterize the contemporary public art. The issues of integration of the public art within the urban context is the object of a visualization component, implemented in interactive web -- based 3D graphics, that relies on the ontological knowledge concerning the public art, integrated with additional ontological descriptions of spatial geographic knowledge.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irish Singh, Kamta Nath Mishra, A. Alberti, Dhananjay Singh, A. Jara
{"title":"A Novel Privacy and Security Framework for the Cloud Network Services","authors":"Irish Singh, Kamta Nath Mishra, A. Alberti, Dhananjay Singh, A. Jara","doi":"10.1109/IMIS.2015.93","DOIUrl":"https://doi.org/10.1109/IMIS.2015.93","url":null,"abstract":"This paper presents an overview of security and it's issues in cloud computing. Nowadays cloud computing has tremendous usage in so many fields such as financial management, communications and collaboration, office productivity suits, accounting applications, customer relationship management, online storage management, human resource and employment. Owing to increase in use of these services by companies, several security issues have emerged and this challenges cloud computing architectures to secure, protect and process user's data. These services have certain cons like security, lock-in, lack of control, and reliability. Privacy and security are the major concerns in cloud computing services. In this paper, we have designed a novel secure framework for cloud services, as well as presented a critical analysis of CCMP (Counter with Cipher Block Message Authentication Code Protocol) protocol for secure data management of cloud services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131416351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qualitative Evaluation of Full Body Movements with Gesture Description Language","authors":"T. Hachaj, M. Ogiela","doi":"10.1109/AIMS.2014.32","DOIUrl":"https://doi.org/10.1109/AIMS.2014.32","url":null,"abstract":"The motivation for writing this paper is to present the method for qualitative evaluation of full body movements with Gesture Description Language. By qualitative evaluation we understand the possibility of evaluating the similarity between the template of movement defined in GDL script (GDLs) and physical activity performed by observed user. The establishing of this methodology allows us to perform real time evaluation of movements accuracy defined as similarity to the statistically computed templates. The presented methodology can be used not only to perform advanced numerical analysis of movements but also to support multimedia visual feedback to various movements activities in computer applications. The initial evaluation presented in this paper proved that proposed method of qualitative analysis of movements has a potential to be used in practice.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}