Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao
{"title":"The Relation on Prefix Hijacking and the Internet Hierarchy","authors":"Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao","doi":"10.1109/IMIS.2012.40","DOIUrl":"https://doi.org/10.1109/IMIS.2012.40","url":null,"abstract":"Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation on prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three hierarchies based on the power-law and commercial relations of autonomous systems. The relation of network topology and prefix hijacking influence is presented for all sorts of hijacking events in different layers. The result shows that the hierarchical nature of network influences the prefix hijacking greatly.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Secondary Backup Storage with an Isolated Authentication","authors":"Kwangjin Bae, I. You, Kangbin Yim, Taeho Son","doi":"10.1109/IMIS.2012.195","DOIUrl":"https://doi.org/10.1109/IMIS.2012.195","url":null,"abstract":"The primary backup disks store sensitive data such as privacy information and enterprise secrets. However, they are not encrypted usually because they are shared among multiple users in real time. Nevertheless, there is no concept of additional backing up the disks except the RAID support. This paper introduces a secure secondary backup system for the primary backup disks. The proposed system encrypts the scheduled files and backups them into the secondary backup disks. The encryption process uses the encryption key provided from hardware security modules that were directly plugged into the disks during the synchronization step in which the HSMs authenticate the disk owners and then unplugged. This architecture mechanically separates the HSM from the host, makes it immune to the reverse attack at the host side and keeps the disks safe from the insider's attack combined with a physical theft.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang
{"title":"ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6","authors":"Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang","doi":"10.1109/IMIS.2012.65","DOIUrl":"https://doi.org/10.1109/IMIS.2012.65","url":null,"abstract":"As a network-based mobility management solution, Proxy Mobile IPv6 (PMIPv6) has been adopted by IETF, 3GPP and WiMAX to complement the host-based approach. In PMIPv6, the Local Mobility Anchor (LMA) is introduced to perform the mobility management and data forwarding, thus achieving the transparent mobility support. However, it results in the sub optimal routing path and single node failure. To realize the optimal routing and separate the forwarding function from the LMA, several routing optimization solutions have been proposed, but most of them are based on the MIPv6 built-in route optimization mechanism or MAGs tunnel, which incurs the additional overhead. In this paper, we propose a PMIPv6 route optimization solution based on the Identify/Location Split mechanism. Especially, in the proposed solution, a Location Identifier (LID) is assigned to each mobile node and mapped to its Home Network Prefix (HNP) to accomplish the optimal routing and reduce the additional tunnel overhead. The analytical results show that the proposed scheme is better than other schemes in terms of signaling cost, delivery cost and LMA service blocking probability.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Service and Management for Security-Critical Wireless Sensor Network","authors":"Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen","doi":"10.1109/IMIS.2012.94","DOIUrl":"https://doi.org/10.1109/IMIS.2012.94","url":null,"abstract":"For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Context-Aware and Adaptable Room System for Intelligent \"Trusted\" Office-Spaces in Smart Cities","authors":"Timothy French, N. Bessis","doi":"10.1109/IMIS.2012.62","DOIUrl":"https://doi.org/10.1109/IMIS.2012.62","url":null,"abstract":"This visionary paper outlines a future intelligent building office space room system that seeks to ensure that the users of a rent able and/or shared office space do not perform actions that are likely to compromise IT security. We propose that a novel room agent leverages the emergent\"smart\" city paradigm so as to form an accurate a measure as possible of the trustworthiness of the human agents using the office space. Namely, by leveraging pervasive urban sensors embedded in a smart city built environment, data obtained by crowd sourcing as well as data gathered via Web 2.0. Human actions detected within the room itself and its immediate environs, together with the behavioural traces and patterns of a given individual embedded within a smart city context, can be used to calculate a measurable confidence trust level. We suggest that the use of a Linking Open (or object) Data (LOD) publishing approach can be used to integrate trust related distributed data in a collective and intelligent manner. Furthermore, we suggest the use of cloud diagram and tree map visualisation approaches to depict individual and environs trust levels at both coarse and fine grain levels. To achieve this, we illustrate the approach using a low-level architecture model. We then conclude by outlining our theoretical lightweight trust model which aims to demonstrate how a smart city in general and a smart space in particular can provide an increased level of trust visualisation for it's citizens, through collective intelligence gathering.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneous Sensors Become Homogeneous Things in Smart Cities","authors":"M. Fazio, M. Paone, A. Puliafito, M. Villari","doi":"10.1109/IMIS.2012.136","DOIUrl":"https://doi.org/10.1109/IMIS.2012.136","url":null,"abstract":"Smart Cities offer a new approach for optimizing services, reducing costs, simplifying the management of Future Cities, enabling new services for citizens. In the Future Internet initiatives, Sensors Networks assume even more a crucial role, especially for making smarter cities. Sensors, becoming smart, will represent the peripheral elements of a complex future ICT world. However, due to the specific application field, smart sensors are very heterogeneous in terms of communication technologies, sensing features and elaboration capabilities. To overcome issues due to the high heterogeneity in this paper we present a new architecture able to make a dual abstraction of complex sensing infrastructures along with data they collect. An important key of this work is to provide a service at world wide level, that is scalable and flexible. The architecture implementation is based on Sensor Web Enablement standard specifications and makes use of the Contiki Operating System for accomplishing the Internet of Things.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Botnet Topology Reconstruction: A Case Study","authors":"Ming-Yi Liao, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, Ming-Cho Chang","doi":"10.1109/IMIS.2012.114","DOIUrl":"https://doi.org/10.1109/IMIS.2012.114","url":null,"abstract":"Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the bot net and the infection period can be observed and analyzed so that better defense tools can be built.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124994179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, T. Isohara, K. Takemori, M. Nishigaki
{"title":"A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System","authors":"Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, T. Isohara, K. Takemori, M. Nishigaki","doi":"10.1109/IMIS.2012.143","DOIUrl":"https://doi.org/10.1109/IMIS.2012.143","url":null,"abstract":"To realize the provision of secure Android applications, this paper proposes an application development and management system, or ADMS for short, that is operated and maintained by application developers and the market manager. ADMS requires (i) Android OS to be equipped with a \"security manager\", (ii) all application developers to embed a code for event notification into applications to tell every event to the security manager whenever an application launches a security-related event, and (iii) market manager to remove all such applications that don't include the event notification code.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Collaborative Filtering Using Randomized Response","authors":"H. Kikuchi, Anna Mochizuki","doi":"10.1109/IMIS.2012.141","DOIUrl":"https://doi.org/10.1109/IMIS.2012.141","url":null,"abstract":"This paper proposes a new privacy-preserving recommendation method classified into a randomized perturbation scheme in which a user adds random noise to the original rating value and a server provides a disguised data to allow users to predict rating value for unseen items. The proposed scheme performs perturbation in randomized response scheme, which preserves higher degree of privacy than that of additive perturbation. To address the accuracy reduction of the randomized response, the proposed scheme uses a posterior probability distribution function, derived from Bayes' estimation to reconstruction of the original distribution, to revise the similarity between items computed from the disguised matrix. A simple experiment shows the accuracy improvement of the proposed scheme.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using Ontology","authors":"Hyun Jung Lee, Mye M. Sohn","doi":"10.1109/IMIS.2012.189","DOIUrl":"https://doi.org/10.1109/IMIS.2012.189","url":null,"abstract":"We propose a framework to support collaborative decision-making among multi-mobile users. This framework is comprised of an Agent's Case-based Reasoning, Integrated Ontology Generation and a Value Unification Module. The case-based reasoning module used to semantic similarity calculation and is applied to the extraction of the most similar case from each decision maker's case-base. Each the most similar case can be an alternative solution for the new requirement which makes the collaborative decision among the decision-makers. The number of alternative solutions depends on the number of the collaborative decision-makers. Each extracted case is mapped on a personalized personal ontology by projecting each of the cases onto the meta-ontology for deriving an appropriate solution for the new requirement. The personal ontology consists of the classes and/or instances and their relationships that are common in all the personalized personal ontologies. It is named an integrated ontology. As the next step, to find a collaboratively satisfactory solution, we need to determine the degree of unification of classes or instances on the integrated ontology. The weight of unification means the extent to which the classes and/or instances are shared among the decision-makers. The propagation of unification is performed by the value that has maximum weight of unification using the integrated ontology. The unification is executed recursively until it reaches a collaborative decision. To do so, we propose the ontology-based value unification algorithm. However, if we cannot find the solution after the unification is finished, the real-time interactive negotiation algorithm that is newly proposed by us is applied.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}