Guanling Chen, Bo Yan, Minho Shin, D. Kotz, E. Berke
{"title":"MPCS: Mobile-phone based patient compliance system for chronic illness care","authors":"Guanling Chen, Bo Yan, Minho Shin, D. Kotz, E. Berke","doi":"10.4108/ICST.MOBIQUITOUS2009.6829","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6829","url":null,"abstract":"More than 100 million Americans are currently living with at least one chronic health condition and expenditures on chronic diseases account for more than 75 percent of the $2.3 trillion cost of our healthcare system. To improve chronic illness care, patients must be empowered and engaged in health self-management. However, only half of all patients with chronic illness comply with treatment regimen. The self-regulation model, while seemingly valuable, needs practical tools to help patients adopt this self-centered approach for long-term care. In this position paper, we propose Mobile-phone based Patient Compliance System (MPCS) that can reduce the time-consuming and error-prone processes of existing self-regulation practice to facilitate self-reporting, non-compliance detection, and compliance reminders. The novelty of this work is to apply social-behavior theories to engineer the MPCS to positively influence patients' compliance behaviors, including mobile-delivered contextual reminders based on association theory; mobile-triggered questionnaires based on self-perception theory; and mobile-enabled social interactions based on social-construction theory. We discuss the architecture and the research challenges to realize the proposed MPCS.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TreeDMA: a hybrid MAC/routing solution for small-scale wireless networks","authors":"C. Kam, C. Schurgers","doi":"10.4108/ICST.MOBIQUITOUS2009.6858","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6858","url":null,"abstract":"Vehicle-based networks need energy-efficient communication to extend the battery lifetime, which subsequently extends the mission time of the node. We observe that these kinds of networks operate under different assumptions than traditional static sensor networks. The main difference is that these are small-scale networks. This motivates the need for a protocol that is optimized for such scenarios. To handle the communication, we introduce a combined MAC and routing protocol, TreeDMA, that uses a contention-free MAC in conjunction with beaconing and overhearing. We show through simulation that for these kinds of networks, the energy consumption and latency is comparable to an “ideal” omniscient protocol and superior to traditional layered protocols.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive pruning of event decision trees for energy efficient collaboration in event-driven WSN","authors":"S. Ortmann, M. Maaser, P. Langendörfer","doi":"10.4108/ICST.MOBIQUITOUS2009.6856","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6856","url":null,"abstract":"Wireless Sensor Networks (WSN) are considered to be the key-enabler for low cost highly distributed applications in the area of homeland security, healthcare, environmental monitoring etc. A necessary prerequisite is reliable and efficient event detection. This paper introduces a novel approach for event configuration and in network processing, called Event Decision Trees (EDT). An EDT enables every node to self-divide event queries according to its resources. EDT autonomously adapt to the tasks assigned, even though it requires to organize collaboration between nodes to deliver expected results. The effort for maintain formal EDT is evaluated by analysis and simulations. Our results show that the proposed lease-based mechanism for maintaining producer/consumer pairs in an EDT outperforms even idealized Acknowledgment-based approaches.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative parking space allocation in vehicular ad hoc networks","authors":"T. Delot, N. Cenerario, S. Ilarri, S. Lecomte","doi":"10.4108/ICST.MOBIQUITOUS2009.7050","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.7050","url":null,"abstract":"By exchanging events in a vehicular ad hoc network, drivers can receive interesting information while driving. For example, they can be informed of available parking spaces in their vicinity. Obviously, a suitable protocol is needed to disseminate the events efficiently within the area where they are relevant. Moreover, in such a competitive context where each vehicle may be interested in the resource, it is crucial not to broadcast that resource to each driver in the vicinity. Otherwise, those drivers would waste time trying to reach a parking space and only one of them would be satisfied, which would lead to a poor satisfaction in the system. To solve this problem, we propose a reservation protocol to allocate parking spaces in vehicular ad hoc networks that avoids the competition among the vehicles. In this paper, we present the basic ideas of our proposal.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing communication-oriented node authentication for VANETs","authors":"P. Caballero-Gil, C. Hernández-Goya","doi":"10.4108/ICST.MOBIQUITOUS2009.6911","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6911","url":null,"abstract":"Vehicular Ad-hoc NETworks (VANETs) present unique challenges such as high node mobility, real-time constraints, scalability, gradual deployment and privacy. No existent node authentication technique addresses all these requirements. In particular, both inter-vehicle and vehicle-to-roadside wireless communications have different privacy and efficiency needs that must be taken into account when defining node authentication services.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132549579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks","authors":"A. Yavuz, P. Ning","doi":"10.4108/ICST.MOBIQUITOUS2009.6824","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6824","url":null,"abstract":"Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors) and receivers (e.g., mobile data collectors, static sinks). The lack of real-time communication forces sensors to accumulate the sensed data possibly for long time periods, along with the corresponding signatures for authentication purposes. Moreover, non-real-time characteristic of UWSNs makes sensors vulnerable especially to active adversaries, which compromise sensors and extract all data stored in them. Hence, it is critical to have forward security property such that even if the adversary can compromise the current keying materials, she cannot modify or forge authenticated data generated before the node compromise. Forward secure and aggregate signatures are cryptographic primitives developed to address these issues. Unfortunately, existing forward secure and aggregate signature schemes either impose substantial computation and storage overhead, or do not allow public verifiability, thereby impractical for resource-constrained UWSNs. In order to address these problems, we propose a new class of signature schemes, which we refer to as Hash-Based Sequential Aggregate and Forward Secure Signature (HaSAFSS). Such a scheme allows a signer to sequentially generate a compact, fixed-size, and publicly verifiable signature at a nearly optimal computational cost. We propose two HaSAFSS schemes, Symmetric HaSAFSS (Sym-HaSAFSS) and Elliptic Curve Cryptography (ECC) based HaSAFSS (ECC-HaSAFSS). Both schemes integrate the efficiency of MAC-based aggregate signatures and the public verifiability of bilinear map based signatures by preserving forward security via Timed-Release Encryption (TRE). We demonstrate that our schemes are secure under appropriate computational assumptions. We also show that our schemes are significantly more efficient in terms of both computational and storage overheads than previous schemes, and therefore quite practical for even highly resource-constrained UWSN applications.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOBIX: System for managing mobility using information exchange","authors":"J. Pedrasa, A. Seneviratne","doi":"10.4108/ICST.MOBIQUITOUS2009.6795","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6795","url":null,"abstract":"It is evident that mobile devices of the future will have multiple wireless interfaces. For small, energy-constrained devices, determining network availability by keeping all radio interfaces turned on at all times will negatively impact battery lifetime even when these interfaces are idle. Predicting future network availability from user history requires a period of training and learning user habits. This method will fail when users deviate from their routines constantly or move to locations not visited before. We propose a different approach to determining network availability of mobile nodes which leverages on the fact that nodes on the move will meet other nodes who will be able to share conditions of networks they have recently encountered. This paper presents MOBIX, a system where nodes exchange information about network conditions using short-range communication such as Bluetooth. Our simulation results show that the required number of nodes needed for 100% success is not unrealistic of densely populated metropolitan areas. Even with relatively low population densities, we can expect a data store hit more than 50% of the time. Although our evaluation used WiFi, our scheme can easily be extended for other technologies such as GSM and WiMax.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-based fault Diagnosis for IEEE 802.11 wireless LANs","authors":"Bo Yan, Guanling Chen","doi":"10.4108/ICST.MOBIQUITOUS2009.6833","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6833","url":null,"abstract":"The increasingly deployed IEEE 802.11 wireless LANs (WLANs) challenge traditional network management systems because of the shared open medium and the varying channel conditions. There needs to be an automated tool that can help diagnosing both malicious security faults and benign performance faults. It is often difficult, however, to identify the root causes since the manifesting anomalies from network measurements are highly interrelated. In this paper we present a novel approach, called MOdel-based self-DIagnosis (MODI), for fault detection and localization.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient task allocation for data fusion in Wireless Sensor Networks","authors":"L. Zhigang, Li Shining, Zhou Xing-she, Yang Zhiyi","doi":"10.4108/ICST.MOBIQUITOUS2009.6877","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6877","url":null,"abstract":"Data fusion or In-network processing methods were often adopted in Wireless Sensor Networks (WSNs) to reduce data communication and prolong network lifetime, which made WSNs application can be described as a set of tasks (sensing, processing) and dependencies among them. Task assignment has become an important problem which needed to be resolved for different tasks assignment caused different energy consumption. Based on the task graph of WSNs, an energy-efficient task assignment framework was proposed. As application task can be decomposed into sensing subtasks and processing subtasks, we present the task assignment as sensing subtask assignment and processing subtask assignment. We formulate the processing subtask assignment as a 0–1 quadratic programming problem and evaluate it through experiments.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure self-adaptive mission-critical communication for distributed smart home sensor network","authors":"R. Muraleedharan, L. Osadciw","doi":"10.4108/ICST.MOBIQUITOUS2009.7059","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.7059","url":null,"abstract":"The inexpensive tiny wireless sensor can be embedded in devices to enable any commercial application, but are prone to intruder attacks. Due to the limited resource constraint in wireless sensor network, security in protocols is sacrificed or kept minimal. The distributive and self-organizing nature of sensor based on environment requires protocol to be adaptive, energy efficient and secure. In this paper, we analyze the different encryption schemes and their shortcoming in providing an energy efficient solution for sensor network. Secondly, we propose a communication protocol that balances resources while achieving mission critical solution using bio-inspired multi-objective algorithm. Thirdly, the accuracy of threat detection is analyzed using threshold approach based on sensor characteristics.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}