{"title":"A Method for Embedding Secret Key Information in RSA Public Key and Its Application","authors":"Motoki Kitahara, T. Nishide, K. Sakurai","doi":"10.1109/IMIS.2012.123","DOIUrl":"https://doi.org/10.1109/IMIS.2012.123","url":null,"abstract":"In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network","authors":"Tianhan Gao, Nan Guo, Kangbin Yim","doi":"10.1109/IMIS.2012.194","DOIUrl":"https://doi.org/10.1109/IMIS.2012.194","url":null,"abstract":"In order to establish secure access for multi-operator wireless mesh network (WMN), this paper proposes a delegation-based authentication scheme under broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router though ticket which is equipped with identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both mesh client side and mesh router side. As a byproduct, key agreement among participants is also implemented to protect the subsequent communications. Security analysis demonstrates that our proposed scheme is resilient to various kinds of attacks.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra
{"title":"DAAF: A Device Abstraction and Aggregation Framework for Smart Environments","authors":"A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra","doi":"10.1109/IMIS.2012.116","DOIUrl":"https://doi.org/10.1109/IMIS.2012.116","url":null,"abstract":"Largely motivated by the ubiquitous computing vision, computers have been steadily becoming integrated in people's life, expanding the ability of software applications to interact with the environment and the users. This has led to the creation of smart environments that support people in their daily life by exploiting information acquired using sensor networks. These systems are usually populated by multiple non-interoperable technologies that make the development, deployment and reutilization of applications a complex and repetitive task. This paper presents DAAF, a Device Abstraction and Aggregation Framework that provides a common conceptual model of a device network, and a set of tools, which allow a flexible integration of heterogeneous sensor networks, enabling fast development and reconfiguration of smart environment applications.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability","authors":"Yuji Suga","doi":"10.1109/IMIS.2012.138","DOIUrl":"https://doi.org/10.1109/IMIS.2012.138","url":null,"abstract":"In November 2009, Marsh Ray, Steve Dispensa and Martin Rex released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not settled. In this paper, we discuss about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Media Coverage on the Stock Returns and Momentum Profits","authors":"Kuei-Yuan Wang, Chien-Kuo Chen","doi":"10.1109/IMIS.2012.151","DOIUrl":"https://doi.org/10.1109/IMIS.2012.151","url":null,"abstract":"Media coverage not only provides much firm-specific information to the investor public intuitionally, but also is informative to the stock price. This study tries to examine whether media coverage is an important factor to stock returns on the Taiwan stock market. Our empirical results support this finding on the Taiwan stock market, and find investors can utilize momentum strategies to earn abnormal returns. These findings can provide some meaningful insights to e-business corporate manager, while releasing some news to the public.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132860285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr
{"title":"Security of a Public Cloud","authors":"Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr","doi":"10.1109/IMIS.2012.78","DOIUrl":"https://doi.org/10.1109/IMIS.2012.78","url":null,"abstract":"This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security in cloud computing will be given.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geocast Routing Protocols for VANETs: Survey and Guidelines","authors":"S. Allal, S. Boudjit","doi":"10.1109/IMIS.2012.133","DOIUrl":"https://doi.org/10.1109/IMIS.2012.133","url":null,"abstract":"In Vehicular Ad Hoc Networks VANETs, a multitude of applications need to address not a single vehicle on the road, nor the whole totality of vehicles, but only a community of vehicles which share the same geographic location for the purpose of safety, traffic efficiency, advertising or infotainment. The goal is to transmit data from a unique source node to a set of destination nodes satisfying a set of geographic criteria. Geocast routing protocol in VANETs appear to be the most appropriate routing technique for these applications. In this investigation, we introduce some existing Geocast routing protocols for VANETs and then we provide a classification of these protocols based on the used relay selection technique. We present a comparison of these Geocast routing protocols according to different criteria and finally, we highlight some directions we are considering for our Geocast routing solution for VANETs.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim
{"title":"Similarity Measurement between Objects and Activities for User Intention Modeling","authors":"Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim","doi":"10.1109/IMIS.2012.31","DOIUrl":"https://doi.org/10.1109/IMIS.2012.31","url":null,"abstract":"User intention modeling is a core part to provide appropriate services in ubiquitous and pervasive computing. And the modeling should be concentrated on preparing user activities according to objects which user approaches or touches. In other works, they just contribute to constructing the modeling under restricted conditions such as places. In order to prepare wide ranging and important factors, this work proposes similarity measurement between objects and activities. Through an evaluation, we show how effective this work is and provide its contributions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching","authors":"Benjamin Peterson, S. Ricciardi, Jordi Nin","doi":"10.1109/IMIS.2012.60","DOIUrl":"https://doi.org/10.1109/IMIS.2012.60","url":null,"abstract":"Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have not been evaluated and the achievable energy savings have not been quantified yet. In particular, it was necessary to investigate whether the security vulnerabilities existing in physical switches had persisted into the virtual environment. This paper provides an evaluation of the energy saving and an analysis of the security implications of the Cisco Nexus virtual distributed switching environment.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resolving Coordination Challenges in Cooperative Mobile Services","authors":"R. Alcarria, T. Robles, A. Dominguez, E. Cedeño","doi":"10.1109/IMIS.2012.131","DOIUrl":"https://doi.org/10.1109/IMIS.2012.131","url":null,"abstract":"The Internet of Things enables environments where objects are fully interconnected, allowing the execution of smart services and the consumption of functionalities provided by surrounding Web objects. This loose-coupled object interconnection demands improvements in the control plane for an optimum coordination between distributed services in mobile devices. There are several coordination challenges in these environments, related to the interaction between services, the communication channels establishment across service fragments and the transmission of events at runtime. This paper defines a coordination model and proposes solutions to these challenges by developing a cooperative service execution model for mobile environments, using the publish-subscribe paradigm for communicating control events. Subsequently, we evaluate this model and analyze the improvements of the designed optimization mechanisms over the MQTT protocol and the NS-3 simulator.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}