{"title":"Privacy protection for secure mobile RFID service","authors":"Doo-Ho Choi, Tae Sung Kim, H. Kim","doi":"10.1109/ISWPC.2006.1613661","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613661","url":null,"abstract":"Widespread deployment of radio frequency identification (RFID) tags may create new threats to user privacy due to the automated tracking capability. Recently, RFID technology shows a convergence tendency. RFID reader is contained in a mobile phone. User privacy problem is a prior consideration for mobile RFID service deployment, since most mobile RFID service scenario is based on end-user service. In this paper, we propose a new solution for user privacy protection, which is a modification of EPC Class-1 Generation-2 protocol. Furthermore, we introduce a privacy protection scenario for mobile RFID service using this proposed scheme.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of energy consumption of IEEE 802.11 DCF under non-saturation conditions","authors":"K. Sakakibara, H. Nakagawa, J. Yamakita","doi":"10.1109/ISWPC.2006.1613575","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613575","url":null,"abstract":"We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on the model in G.R. Cantieni et al., (2005). The model explicitly takes into account both the carrier sensing mechanism and an additional backoff interval after successful frame transmission, which can be ignored under saturation conditions. The probability generating function with respect to energy consumed between consecutive frame generations is derived. Numerical example shows that most of the energy is wasted in carrier sensing when the frame generation probability is smaller than some critical value and that the energy consumed in overhearing a frame destined to another user occupies the major part otherwise.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadband access device and user interface design for ubiquitous computing: perspective from a service provider","authors":"T. Singh, M. L. Sim","doi":"10.1109/ISWPC.2006.1613642","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613642","url":null,"abstract":"Devices such as cell phones, smart phones, personal digital assistants, are increasing in number. These devices have become almost indispensable in our modern society. In spite of the proliferation of these devices, the design is done by device manufactures with little interaction or input from the service providers. This paper is intended to provide a brief glimpse into the design thought process from the perspective of a service provider. A series of scenarios will be discussed that can be used to generate user requirements for a universal access device. The traditional design approach is then discussed and the perspective of the service provider is presented.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-group-based authentication services for mobile ad hoc networks","authors":"Chih Chang, J. Lin, F. Lai","doi":"10.1109/ISWPC.2006.1613623","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613623","url":null,"abstract":"In recent years, mobile ad hoc networks have received more attention, because of their easy deployment. However, the characteristics of mobile ad hoc networks are more prone to physical security threats than the wired network environments. Therefore, it has become a primary concern of securing mobile ad hoc networks. In this paper, we address the problem of authentication in mobile ad hoc networks. Public-key based mechanisms are ideal to provide the authentication services. Although this is already mature in a fixed network, providing public key based authentication is still very challenging in mobile ad-hoc networks because of shared wireless medium, energy constrains, dynamic network topology. Here, we present a more efficient public key management system, like self-organized scheme (S. Capkun et al., 2003), and include the concept of trust group for mobile ad hoc networks.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou
{"title":"Handling personalized redirection in a wireless pervasive computing system with different approaches to identity","authors":"Yuping Yang, M. Williams, N. Taylor, S. McBurney, E. Papadopoulou","doi":"10.1109/ISWPC.2006.1613665","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613665","url":null,"abstract":"One important feature of a wireless pervasive computing system is to ensure that any incoming communication addressed to the user is dealt with according to the user's wishes - sent to an appropriate device, forwarded to another user, stored, etc. This is referred to as personalized redirection of communication. To do this it is necessary to maintain a profile of user preferences. However, in doing so, there is a natural risk to the security and privacy of the user. This paper considers two systems - one developed specifically to study personalized redirection and the other a wireless pervasive computing system which incorporates some of these ideas. Three different approaches to handling user identity that have been adopted in these two systems are described. The effects of these different approaches on personalization and the consequences for security and privacy in a wireless pervasive computing environment are discussed and compared.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Adaptive Reception Technique for Satellite-DMB systems in a Rician Channel","authors":"Jae Sung Lee, Peng Gong, D. Kim","doi":"10.1109/ISWPC.2006.1613568","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613568","url":null,"abstract":"Satellite-Digital Multimedia Broadcasting (S-DMB) systems make it possible to watch the televisions on the hands as well as in the vehicular outside. But in case of handheld version of terminal, especially S-DMB phone, there are several challenging issues, which have not been seen in the other terminals. One of these issues is short viewing time, which is caused by limited battery. In this paper, we propose an Adaptive Reception Technique (ART) which provides power saving when the line-of-sight path exists from the satellite. By launching the Frame Selection Control (FSC) at the receiver and modifying the puncturing algorithm, we can simply employ ART and reduce power consumption by about 17.5∼25.5%/.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MANET Route Discovery using Residual Lifetime Estimation","authors":"J. Barria, Ricardo Lent","doi":"10.1109/ISWPC.2006.1613589","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613589","url":null,"abstract":"We define a MANET route discovery protocol particularly suitable for networks that exhibit a rapid changing topology. LDRP relies on an auxiliary sensor network to gather localization information of nodes and makes use of this information to identify links of high residual lifetime for communications. In simulation, we show that LDRP outperforms the level of service provided by a flooding based algorithm. This advantage is clearly seen in terms of both higher throughput and lower packet loss for UDP or TCP based traffic.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty
{"title":"Personalized Dynamic Composition of Services and Resources in a Wireless Pervasive Computing Environment","authors":"M. Williams, Yuping Yang, N. Taylor, S. McBurney, E. Papadopoulou, F. Mahon, M. Crotty","doi":"10.1109/ISWPC.2006.1613627","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613627","url":null,"abstract":"A wireless pervasive computing environment needs to dynamically adapt its functionality and behaviour to changes in the resources and services available to a user at any point in time. For a mobile user this means that as the user changes location, the pervasive environment should take account of any changes to the services that are available. Thus initially when the user requests a service the most appropriate service must be provided, but as the user moves around, the service provided could change. To handle this, a wireless pervasive system needs to provide dynamic service composition (and re-composition) based on the user's personal preferences and current context. The Daidalos project is developing a platform to support pervasive services, which provides dynamic personalized service composition. This paper describes the problems and the role of personalization in the approaches adopted in Daidalos to deal with dynamic service composition and re-composition. The basic ideas have been prototyped and demonstrated, and are currently being integrated and extended.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Node supporting Context-aware Vertical Handover in Pervasive Computing Environment with Redundant Positioning","authors":"S. Balasubramaniam, T. Pfeifer, J. Indulska","doi":"10.1109/ISWPC.2006.1613612","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613612","url":null,"abstract":"A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124471709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed context aware model for pervasive service environment","authors":"Tang Xiaosheng, Shen Qinghua, Zhang Ping","doi":"10.1109/ISWPC.2006.1613629","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613629","url":null,"abstract":"Context-based service is the trend of next generation service especially under the wireless pervasive computing environment. In order to provide the always best experience (ABE) under heterogeneous communication system, it's very important for applications to get support from distributed context information. So, the context aware system should have the ability of collecting, processing and providing inferred result to applications in distributed environment. In this paper, we introduce a distributed context aware model to accomplish this goal and give some explanations for every module. We have also carried out a prototype testbed to give a demonstration of this model.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}