2006 1st International Symposium on Wireless Pervasive Computing最新文献

筛选
英文 中文
Privacy protection for secure mobile RFID service 安全移动RFID服务的隐私保护
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613661
Doo-Ho Choi, Tae Sung Kim, H. Kim
{"title":"Privacy protection for secure mobile RFID service","authors":"Doo-Ho Choi, Tae Sung Kim, H. Kim","doi":"10.1109/ISWPC.2006.1613661","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613661","url":null,"abstract":"Widespread deployment of radio frequency identification (RFID) tags may create new threats to user privacy due to the automated tracking capability. Recently, RFID technology shows a convergence tendency. RFID reader is contained in a mobile phone. User privacy problem is a prior consideration for mobile RFID service deployment, since most mobile RFID service scenario is based on end-user service. In this paper, we propose a new solution for user privacy protection, which is a modification of EPC Class-1 Generation-2 protocol. Furthermore, we introduce a privacy protection scenario for mobile RFID service using this proposed scheme.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions IEEE 802.11 DCF在非饱和条件下的能耗分析
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613575
K. Sakakibara, H. Nakagawa, J. Yamakita
{"title":"Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions","authors":"K. Sakakibara, H. Nakagawa, J. Yamakita","doi":"10.1109/ISWPC.2006.1613575","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613575","url":null,"abstract":"We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Broadband access device and user interface design for ubiquitous computing: perspective from a service provider 面向普适计算的宽带接入设备和用户界面设计:服务提供商的视角
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613642
T. Singh, M. L. Sim
{"title":"Broadband access device and user interface design for ubiquitous computing: perspective from a service provider","authors":"T. Singh, M. L. Sim","doi":"10.1109/ISWPC.2006.1613642","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613642","url":null,"abstract":"Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-group-based authentication services for mobile ad hoc networks 移动自组网中基于信任组的身份验证服务
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613623
Chih Chang, J. Lin, F. Lai
{"title":"Trust-group-based authentication services for mobile ad hoc networks","authors":"Chih Chang, J. Lin, F. Lai","doi":"10.1109/ISWPC.2006.1613623","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613623","url":null,"abstract":"In recent years, mobile ad hoc networks have received more attention, because of their easy deployment. However, the characteristics of mobile ad hoc networks are more prone to physical security threats than the wired network environments. Therefore, it has become a primary concern of securing mobile ad hoc networks. In this paper, we address the problem of authentication in mobile ad hoc networks. Public-key based mechanisms are ideal to provide the authentication services. Although this is already mature in a fixed network, providing public key based authentication is still very challenging in mobile ad-hoc networks because of shared wireless medium, energy constrains, dynamic network topology. Here, we present a more efficient public key management system, like self-organized scheme (S. Capkun et al., 2003), and include the concept of trust group for mobile ad hoc networks.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Handling personalized redirection in a wireless pervasive computing system with different approaches to identity 在具有不同身份识别方法的无线普适计算系统中处理个性化重定向
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613665
Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou
{"title":"Handling personalized redirection in a wireless pervasive computing system with different approaches to identity","authors":"Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou","doi":"10.1109/ISWPC.2006.1613665","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613665","url":null,"abstract":"One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel 一种新的卫星- dmb信道自适应接收技术
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613568
Jae Sung Lee, Peng Gong, D. Kim
{"title":"A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel","authors":"Jae Sung Lee, Peng Gong, D. Kim","doi":"10.1109/ISWPC.2006.1613568","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613568","url":null,"abstract":"Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment 无线普适计算环境中服务和资源的个性化动态组合
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613627
M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty
{"title":"Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment","authors":"M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty","doi":"10.1109/ISWPC.2006.1613627","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613627","url":null,"abstract":"A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning 基于冗余定位的普适计算环境下支持上下文感知垂直切换的主动节点
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613612
S. Balasubramaniam, T. Pfeifer, J. Indulska
{"title":"Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning","authors":"S. Balasubramaniam, T. Pfeifer, J. Indulska","doi":"10.1109/ISWPC.2006.1613612","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613612","url":null,"abstract":"A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A distributed context aware model for pervasive service environment 面向普适服务环境的分布式上下文感知模型
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613629
Tang Xiaosheng, Shen Qinghua, Zhang Ping
{"title":"A distributed context aware model for pervasive service environment","authors":"Tang Xiaosheng, Shen Qinghua, Zhang Ping","doi":"10.1109/ISWPC.2006.1613629","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613629","url":null,"abstract":"Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Balancing image quality and energy consumption in visual sensor networks 在视觉传感器网络中平衡图像质量和能量消耗
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613565
K. Chow, K. Lui, E. Lam
{"title":"Balancing image quality and energy consumption in visual sensor networks","authors":"K. Chow, K. Lui, E. Lam","doi":"10.1109/ISWPC.2006.1613565","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613565","url":null,"abstract":"Applications of wireless sensor networks have attracted a lot of attention recently. Cameras are installed in various locations of a wide area to capture images of targeted objects. Because of constraints in computational capability in these distributed cameras, it may not be feasible to analyze these images in the sensors but they have to be transmitted to a centralized server hop by hop through the sensor network. To reduce the energy used in transmission, the size of the images should be kept small by applying a large compression ratio, which may degrade image quality. This paper studies the tradeoff between image quality and energy consumption. We study the scenario that a number of camera-equipped sensors are taking pictures of the same object, and the pictures of adjacent cameras may overlap. We demonstrate that by allowing intermediate sensors to process the images and combine the overlapping portions, the total energy spent on transmission is reduced subject to a certain degradation in image quality. The tradeoff between image quality and energy consumption of different routing presents an important study on the practicability of visual sensor networks.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116009073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信