G. Ananthanarayanan, V. Padmanabhan, C. Thekkath, Lenin Ravindranath
{"title":"Collaborative Downloading for Multi-homed Wireless Devices","authors":"G. Ananthanarayanan, V. Padmanabhan, C. Thekkath, Lenin Ravindranath","doi":"10.1109/HotMobile.2007.19","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.19","url":null,"abstract":"Mobile devices are increasingly equipped with multiple network interfaces: Wireless Local Area Network (WLAN) interfaces for local connectivity and Wireless Wide Area Network (WWAN) interfaces for wide-area connectivity. The WWAN typically provides much wider coverage but much lower speeds than the WLAN. To address this dichotomy, we consider collaborative downloading among mobile devices in close proximity. We demonstrate the potential benefits of such an approach and discuss the many challenges to realizing it in practice: incentivizing cooperation by adequately compensating nodes, effecting such cooperation via an efficient protocol, and facilitating it with a suitable user interface. We present our current thinking on these as we design a collaborative downloading system called COMBINE.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arunesh Mishra, Shravan K. Rayanchu, Ashutosh Shukla, Suman Banerjee
{"title":"Towards Secure Localization Using Wireless \"Congruity'","authors":"Arunesh Mishra, Shravan K. Rayanchu, Ashutosh Shukla, Suman Banerjee","doi":"10.1109/HotMobile.2007.18","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.18","url":null,"abstract":"Traditional methods for localization in wireless networks rely on the correlation of the received signal strength with physical distance. It is also well known, that these mechanisms fail in an adversarial setting due to the lack of robustness of the signal strength property to malicious intent. In this paper, we present a property of the wireless medium, which we call \"wireless congruity', that captures the relative similarities in wireless media characteristics (such as packet receptions, idle channel time, etc.) as observed by two receivers that are in physical proximity of each other. We show that wireless congruity holds promise for secure localization by presenting an initial yet encouraging set of results obtained through extensive experimentation in a rich indoor wireless environment.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Brik, Vivek Shrivastava, Arunesh Mishra, Suman Banerjee, P. Bahl
{"title":"Towards an Architecture for Efficient Spectrum Slicing","authors":"V. Brik, Vivek Shrivastava, Arunesh Mishra, Suman Banerjee, P. Bahl","doi":"10.1109/HotMobile.2007.17","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.17","url":null,"abstract":"With the increased demands for wireless spectrum, dynamic spectrum sharing is emerging as an important and powerful concept. Most research in this domain is being conducted in design of cognitive radios and on specific PHY and MAC layer challenges associated with them. However, for a dynamic spectrum sharing architecture to be viable, research is needed to resolve many other challenges, e.g., in the context of real-time spectrum management and enforcement. This paper is the first to present a study of some such important architectural considerations, driven by our ongoing design and implementation of a spectrum sharing system, called Spark. We propose some promising approaches to address these challenges, and enumerate the need and opportunities for significant future research in this domain.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheolho Cheong, T. Han, Jae-Yun Kim, Taek-Jean Kim, Kee-Jun Lee, Sang-Yong Lee, A. Itoh, Yasumoto Asada, C. Craney
{"title":"Pictorial Image Code: A Color Vision-based Automatic Identification Interface for Mobile Computing Environments","authors":"Cheolho Cheong, T. Han, Jae-Yun Kim, Taek-Jean Kim, Kee-Jun Lee, Sang-Yong Lee, A. Itoh, Yasumoto Asada, C. Craney","doi":"10.1109/HotMobile.2007.8","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.8","url":null,"abstract":"In recent years, extensive research has been carried out on vision-based automatic identification technology that recognizes image codes using a camera phone, and then provides various services. These image codes such as one-dimensional barcodes and two-dimensional codes consist of black and white patterns for easier and faster recognition by the reader. Therefore, the image codes have limitations in providing information for users, such as service type and service aim, because their patterns are sensitive to deformations. In this paper, we propose a color-based image code that is configurable and can present visual information on its service. Moreover, we describe an encoding/decoding technology and actual services of the image code.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"My iPod is my Pacifier\": An Investigation on the Everyday Practices of Mobile Video Consumption","authors":"Alex Vorbau, A. Mitchell, Kenton O'hara","doi":"10.1109/HotMobile.2007.10","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.10","url":null,"abstract":"New mobile digital video technologies are creating dramatic shifts in the ways that video-based content can be produced, consumed, and delivered. One such shift has been the emergence of mobile video devices like video-enabled iPods and mobile phones. In the same way that the Walkman revolutionized music consumption behaviors, these mobile video devices are changing how, when, and where people are interacting with video. Another revolutionary shift comes from video content web sites like YouTube and Google Video which publish vast quantities of video content viewable on mobile devices. Such technology revolutions change the way users behave and change their expectations in regards to their mobile video experiences. To help understand these changing behaviors, we conducted a three week study of mobile video users in the US and in the UK. In this paper, we highlight some noteworthy observations from this study.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment","authors":"Alex Varshavsky, A. LaMarca, E. D. Lara","doi":"10.1109/HotMobile.2007.12","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.12","url":null,"abstract":"With the proliferation of mobile devices, spontaneous interactions between co-located devices that do not know each other a priori will become commonplace. Securing these interactions against eavesdropping and man-in-the-middle attacks is an important and challenging task. In this paper, we postulate that mobile devices that are positioned in close proximity may be able to derive a shared secret to secure their communication by monitoring fluctuations in the signal strength of existing ambient radio sources (GSM cell towers or WiFi access points) in their common environment. We explore the feasibility of deriving location-based secrets and describe two approaches for how such a secret could be used to secure spontaneous communication. Deriving location-based secrets is a hard problem because while the radio environment perceived by various devices in close proximity is similar, it is not identical.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scott Garriss, Romó Sailer, Stefan Berger, R. Sailer, L. V. Doorn, Xiaolan Zhang
{"title":"Towards Trustworthy Kiosk Computing","authors":"Scott Garriss, Romó Sailer, Stefan Berger, R. Sailer, L. V. Doorn, Xiaolan Zhang","doi":"10.1109/HotMobile.2007.14","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.14","url":null,"abstract":"We present a system in which a user leverages a personal mobile device to establish trust on a public computing device, or kiosk, prior to revealing personal information to that kiosk. We have designed and implemented a protocol by which the mobile device determines the identity and integrity of the software running on the kiosk. A similar protocol simultaneously allows a kiosk owner to verify that the kiosk is running only approved software. Our system combines a number of emerging security technologies, including the Trusted Platform Module, the Integrity Measurement Architecture, and new support in times86 processors for establishing a dynamic root of trust. In ongoing work, we plan to use virtual machines to support the important case where the user wishes to run personal software on the kiosk. We are also continuing to explore several open issues we have identified surrounding trust in a kiosk scenario.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Davies, Christos Efstratiou, J. Finney, Rob Hooper, Gerd Kortuem, Mark Lowton
{"title":"Sensing Danger - Challenges in Supporting Health and Safety Compliance in the Field","authors":"N. Davies, Christos Efstratiou, J. Finney, Rob Hooper, Gerd Kortuem, Mark Lowton","doi":"10.1109/HotMobile.2007.7","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.7","url":null,"abstract":"Many workers operate in environments that are inherently hazardous and that are subject to strict health and safety rules and regulations. We envisage a world in which physical work artefacts such as tools, are augmented with intelligent mobile nodes that are able to observe the working activities taking place, evaluate compliance with health and safety regulations and assist or actively enforce compliance with these regulations. This vision creates a new field of work in the area of health and safety aware intelligent mobile sensor networks. In this paper we describe a number of new challenges faced when developing mobile systems for compliance with health and safety regulations.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jason Cornwell, Ian Fette, Gary Hsieh, Madhu K. Prabaker, Jinghai Rao, Karen P. Tang, Kami Vaniea, Lujo Bauer, L. Cranor, Jason I. Hong, Bruce McLaren, M. Reiter, N. Sadeh
{"title":"User-Controllable Security and Privacy for Pervasive Computing","authors":"Jason Cornwell, Ian Fette, Gary Hsieh, Madhu K. Prabaker, Jinghai Rao, Karen P. Tang, Kami Vaniea, Lujo Bauer, L. Cranor, Jason I. Hong, Bruce McLaren, M. Reiter, N. Sadeh","doi":"10.1109/HOTMOBILE.2007.21","DOIUrl":"https://doi.org/10.1109/HOTMOBILE.2007.21","url":null,"abstract":"We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128416636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pocket Hypervisors: Opportunities and Challenges","authors":"Landon P. Cox, Peter M. Chen","doi":"10.1109/HotMobile.2007.20","DOIUrl":"https://doi.org/10.1109/HotMobile.2007.20","url":null,"abstract":"In this position paper, we explore the opportunities and challenges of running pocket hypervisors on commodity mobile devices through four proposed applications: secure operating systems, security services, mobile testbeds, and opportunistic sensor networks. We believe that pocket hypervisors can benefit mobile computing, but that mobility presents several important and unique challenges to virtualization.","PeriodicalId":183014,"journal":{"name":"Eighth IEEE Workshop on Mobile Computing Systems and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130342083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}