Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi
{"title":"Basic Design of a User-Driven Service Creation Platform Assisted by Cellular Systems","authors":"Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi","doi":"10.1109/CCNC.2009.4784980","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784980","url":null,"abstract":"In spite of recent advances of personal communication devices and access network technology, users are still facing the issues such as high device maintenance costs, complication of inter-device cooperation, illegal access to devices, and leakage of personal information. Consequently, it is difficult for users to securely construct a network with local as well as remote personal devices. We propose a User-driven Service Creation Platform (USCP), which enables users to construct a secure private network in a simple and intuitive way, making the most of the authentication mechanism in cellular networks. USCP separates signaling and data paths in a flat structure of a virtual network topology. In this paper, we describe the basic design of USCP.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Human Centric Data for Sharing Mobile Internet with Social Buddies","authors":"S. Gurumurthy, A. Ganz","doi":"10.1109/CCNC.2009.4784864","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784864","url":null,"abstract":"We propose a middleware called BuddyShare to automatically form an overlay group of nearby friends' mobile phones to collaboratively download data by sharing mobile internet. This system is hypothetical in nature and only work on certain assumptions such as: 1) frequent availability of friends' phone nearby, 2) Sufficient social trust among physically close users to share internet and 3) sufficient social networking information available in phones. In order to validate these hypotheses, we collected human centric dataset of cellular phone users of university environment to study the user behavior. In this paper, we present certain social and proximity behaviors of these users that validate these hypotheses and show the practical feasibility of a BuddyShare system. We also study the usefulness of BuddyShare by virtually leveraging it on this user network, which concludes around three times scaling in download rate on average.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Buford, Xiaotao Wu, Saratchand Kanuri, R. Bajpai, V. Krishnaswamy
{"title":"Location Privacy Enforcement in a Location-Based Services Platform","authors":"J. Buford, Xiaotao Wu, Saratchand Kanuri, R. Bajpai, V. Krishnaswamy","doi":"10.1109/CCNC.2009.4784931","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784931","url":null,"abstract":"Location privacy management is an important requirement for location based services. Here we describe the design and implementation of location privacy enforcement mechanisms based on the IETF Geopriv specifications as part a location-based services platform that we previously developed. Our design involves a new and more efficient session-based access validation mechanism. In addition, we evaluate the expressiveness of Geopriv rules for describing a variety of privacy rules. We find a number of limitations and propose some methods for extending the rule notation for addressing these limitations. We conclude with an overview of our prototype implementation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"31 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GridMedia+: A P2P Streaming System for Live and On-Demand Video","authors":"Li Zhao","doi":"10.1109/CCNC.2009.4785016","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785016","url":null,"abstract":"Supporting both live and on-demand video in a P2P streaming system is an emerging requirement and a technical trend. This demo showcases an experimental but practical P2P streaming system named GridMedia+, which combines live video streaming and on-demand video streaming in a single P2P engine, and also provides a uniform user interface for both PC users and TV users.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hypervisors for Consumer Electronics","authors":"G. Heiser","doi":"10.1109/CCNC.2009.4784922","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784922","url":null,"abstract":"Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. \u0000 \u0000This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor. We find that enterprise-style hypervisors are ill-matched to the requirements of the embedded domain, which are characterised by low-overhead communication, real-time capability, small memory footprint, small trusted computing base, and fine-grained control over security. We present the OKL4 hypervisor, a member of the L4 microkernel family, designed for embedded-systems use. We outline OKL4's relevant properties with an emphasis on its security mechanisms, and compare its performance to a version of Xen that has recently been promoted for CE use. We conclude that OKL4 is superior to enterprise-style hypervisors for use in CE devices.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go
{"title":"U-FIPI: Ubiquitous Sensor Network Service Infra Supporting Bidirectional Location-Awareness between Mobile Nodes and Fixture Nodes","authors":"Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go","doi":"10.1109/CCNC.2009.4785011","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785011","url":null,"abstract":"We introduce a ubiquitous sensor network system, called U-FIPI, to monitor the early symptom of fire and intruder in indoor environment. Especially, this system adapts a novel approach to provide bidirectional location-awareness service between various mobile nodes and U-FIPI fixture nodes making it suitable for total service as a new concept of building management system.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Nondisruptive Adaptation Scheme for Peer-to-Peer Live Video Streaming during Vertical Handoff","authors":"Seung-Ik Lee, Y. Ko, Dongman Lee, S. Hyun","doi":"10.1109/CCNC.2009.4784811","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784811","url":null,"abstract":"In this paper, we propose QoS-constrained peer selection and nondisruptive rate adaptation schemes with considering shared bottleneck problem to provide a stable peer-to-peer live video streaming service during vertical handoff. In the proposed scheme, a QoS-constrained peer is selected by estimating bandwidth with active probing, and a reception rate converges to a stable state without any QoS degradation with help of multi-path handoff. The shared bottleneck problem is addressed by adjusting the estimated bandwidth and yielding the redundant bandwidth usage.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115260065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPTV, Towards Seamless Infotainment","authors":"Zhu Liu, B. Wei, H. H. Yu","doi":"10.1109/CCNC.2009.4784831","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784831","url":null,"abstract":"IPTV, enabled by aggregating new technologies in computing, networking, and storage, provides a new information access and entertainment platform in the world of digital evolution. From this perspective where information and entertainment are part of each other, we write this paper to address the issues of IPTV towards seamless infotainment. We focus our discussions to explore such IPTV potentials from three aspects: information access and distribution, improving quality of entertainment, and enabling seamless infotainment. In addition, relevant topics such as IPTV standards and future directions are also discussed.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid P2P Overlay Network Programming on a Distributed Reduction Machine","authors":"Kenji Saito, K. Miyazawa","doi":"10.1109/CCNC.2009.4784964","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784964","url":null,"abstract":"To build dependable and sustainable systems requires many iterative trials and stepwise improvements. Rapid programming methods and languages have been studied in the field of peer-to-peer overlay network for this reason. \u0000 \u0000This paper proposes a method for quick programming using Overlay GHC[1] language, an extension of Guarded Horn Clauses[2] for overlay network programming. The method involves a technique called RGP (Remote Goal Placement) instead of RPC over an environment that is viewed as a distributed reduction machine.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SeGCom: Secure Group Communication in VANETs","authors":"M. Verma, Dijiang Huang","doi":"10.1109/CCNC.2009.4784943","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784943","url":null,"abstract":"In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units to expedite authentication for Vehicle-to-Infrastructure (V2I) communication. Furthermore, to enhance the efficiency of Vehicle-to-Vehicle (V2V) communication, SeGCom permits the vehicles to form group, which are also used for performing multi-hop V2V communication without any assistance from a trusted authority. Comparison with other existing schemes in the literature has been performed to show the efficiency and applicability of our scheme.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}