2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things 移位素数:优化智能事物的椭圆曲线密码
Leandro Marín, A. Jara, A. Gómez-Skarmeta
{"title":"Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things","authors":"Leandro Marín, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.199","DOIUrl":"https://doi.org/10.1109/IMIS.2012.199","url":null,"abstract":"The new generation of devices connected to Internet are moving towards billion of small and smart objects, so-called Smart Things. These Smart Things are destined to manage the security of our houses, watch our health, and optimize the energy consumption of our cities. They bring a new set of opportunities, but they also present high challenges regarding scalability, management, bootstrapping, identity verification and authentication. For that reason, this work is focused on addressing the security requirements for Smart Things providing an optimized family of primes for Elliptic Curve Cryptography(ECC), denominated Shifting Primes. ECC on Smart Things needs special optimizations for the cryptographic primitives that requires a precise study of the instruction set and the number of cycles for those instructions. The modular multiplication is the basic operation, critical for highly constrained microprocessors, in terms of which ECC is built. It is optimized and also analyzed the interaction between partial results in the chain of modular multiplications needed for ECC. This optimizations have been carried out over the MSP430, which is a widely extended microprocessor for Smart Things. MSP430 is featured by not offering hardware multiplier. For that reason, we have defined a special kind of prime numbers, the Shifting Primes. They are featured by offering a very fast multiplication algorithm for ECC through addition and shifting operations for the multiplications. It is presented the full faster multiplication algorithm for Shifting Primes. These results are presenting a lowest time and number of operations for the multiplication in ECC than the existing solutions. Finally, note that the presented primes can be applied also to other similar architectures with fast shifting operation on registers.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fuzzy Fault Tree Based Fault Detection 基于模糊故障树的故障检测
Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong
{"title":"Fuzzy Fault Tree Based Fault Detection","authors":"Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong","doi":"10.1109/IMIS.2012.187","DOIUrl":"https://doi.org/10.1109/IMIS.2012.187","url":null,"abstract":"In this article, for the Linux operating system environment, with the characteristics of ambiguity and uncertainty for the occurrence probability of system failures, fuzzy theory is introduced into the fault tree analysis. The occurrence probability of basic events in the conventional fault tree is made fuzzy by introducing the concept of fuzzy sets. Using the upstream method for solving the minimum cut sets and transferring the different fuzzy numbers into triangular fuzzy numbers, the method is validated with the CPU error detection. This way provides a theoretical basis and implementation for system reliability evaluation, fault diagnosis and maintenance decisions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Key Management for Secure Mobile IPTV Service 安全移动IPTV业务的组密钥管理
Inshil Doh, Jiyoung Lim, M. Chung
{"title":"Group Key Management for Secure Mobile IPTV Service","authors":"Inshil Doh, Jiyoung Lim, M. Chung","doi":"10.1109/IMIS.2012.115","DOIUrl":"https://doi.org/10.1109/IMIS.2012.115","url":null,"abstract":"In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management mechanism that supports authentication between eNB and the mobile devices for security enhancement and efficiently rekeys the group key when membership changes. Our proposal can cope with the security vulnerability of mobile IPTV for reliable group communication and guarantees secure group key rekeying in addition to decreasing the storage and communication overhead.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices 基于阈值的移动设备节能数据传输策略
Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn
{"title":"Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices","authors":"Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn","doi":"10.1109/IMIS.2012.43","DOIUrl":"https://doi.org/10.1109/IMIS.2012.43","url":null,"abstract":"It is highly desired to minimize power consumption, because battery power is one of the most critical resources for mobile devices. Significant energy of a mobile device battery is expended by the activated wireless interface embedded while it is not only in transmit/receive mode but also in idle mode. Therefore, it is energy efficient to turn the wireless interface off or in doze mode while it is not used. However, required energy and time for turning the wireless interface are not negligible. Most of recent works have been trying to enhance the hardware architecture or network/MAC protocols. In this paper, we present an energy efficient policy that turns on the wireless interface only when predefined threshold is exceeded and transmits all awaited data. We propose two kinds of threshold - deadline and sending data queue size. For the practical evaluation, we conduct not only simulations but also experimental measurements by implementing on a real test bed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things 轻量级组播DNS和DNS- sd (lmdn - sd):基于ipv6的物联网资源和服务发现
A. Jara, P. Martinez-Julia, A. Gómez-Skarmeta
{"title":"Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things","authors":"A. Jara, P. Martinez-Julia, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.200","DOIUrl":"https://doi.org/10.1109/IMIS.2012.200","url":null,"abstract":"Internet of Things (IoT) is presenting an enormous growing, in numbers, it is estimated that over 50 billion of devices will be connected to Internet by 2020. Therefore, it presents a high scalability requirement to manage every resource connected to the network. Therefore, It is required a high capability for autonomous registration and discovery of resources and services. In addition, it should be dynamically adapted with the inclusion of new devices in the network and changes of the existing ones. Nowadays, the most extended discovery architecture for the Internet is the Domain Name Systems (DNS), which is offering through the extensions multicast DNS (mDNS) and DNS Service Directory (DNS-SD) the query and discovery of services by type and properties. It has been already carried out some initial works on mDNS and DNS-SD for the discovery of things. Thereby, it can satisfy the discovery of resources from the IoT point of view, and discovery of services, i.e. Web Services such as CoAP from the Web of Things point of view. But, it has not been yet analyzed the impact of DNS for Smart Objects, since it cannot be directly applied, because these protocols are designed for host-based requirements, where they are not taking into account the design issues and constraints from the Smart Objects. For that reason, this paper analyzes the requirements and design issues to apply these discovery techniques in Smart Objects, carries out an overview of the satisfaction of them in the initial solutions for IoT, in order to finally offer an evaluation of different ways to apply mDNS and DNS-SD for Smart Objects, concluding with a set of recommendations and lessons learned to build a lightweight implementation of mDNS and DNS-SD for resource discovery and directory.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution 关注于不可信代码执行的虚拟化技术综述
Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang
{"title":"A Survey of Virtualization Technologies Focusing on Untrusted Code Execution","authors":"Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang","doi":"10.1109/IMIS.2012.92","DOIUrl":"https://doi.org/10.1109/IMIS.2012.92","url":null,"abstract":"In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129456923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems 一种提高多基地雷达系统TOA定位精度的方法
Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen
{"title":"A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems","authors":"Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen","doi":"10.1109/IMIS.2012.36","DOIUrl":"https://doi.org/10.1109/IMIS.2012.36","url":null,"abstract":"In this paper, a method to improve the accuracy of the time of arrival position location (TOA-PL) solution in multistatic radar systems is proposed. In the conventional TOA-PL technique, the least square (LS) method is applied to estimate target location. However, the performance of the method is significantly degraded under wrong measured data (called as the great error) at the receiver. Hence, the accuracy of location estimation needs to be improved. In this paper, a scheme is proposed to eliminate the effect of the great error. The performance of the location estimation is evaluated based on the root mean square error (RMSE). The results show that the performance with the proposed scheme is better than that with the conventional scheme.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fighting against Vampire Appliances through Eco-Aware Things 通过生态意识的东西对抗吸血鬼电器
Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña
{"title":"Fighting against Vampire Appliances through Eco-Aware Things","authors":"Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña","doi":"10.1109/IMIS.2012.112","DOIUrl":"https://doi.org/10.1109/IMIS.2012.112","url":null,"abstract":"This paper provides an overview of how Internet connected objects can lead to a social change towards energy efficiency in areas where people inhabit (cities, buildings or homes). For this aim it is proposed the use of social networks, like Twitter, as an interaction and communication channel between smart objects and human beings. The presented work demonstrates, by means of an experiment, how an augmented everyday object, i.e. a capsule-based coffee machine, may help to reduce the unnecessary consumed energy in electric appliances. The paper opens the discussion of the promising potential of combining people and future smart everyday objects teaming up to promote a more sustainable behaviour on the planet's behalf.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mixed Reality-Aware Service Architecture for Mobile Environments 面向移动环境的混合现实感知服务架构
A. Dominguez, T. Robles, R. Alcarria, E. Cedeño
{"title":"Mixed Reality-Aware Service Architecture for Mobile Environments","authors":"A. Dominguez, T. Robles, R. Alcarria, E. Cedeño","doi":"10.1109/IMIS.2012.124","DOIUrl":"https://doi.org/10.1109/IMIS.2012.124","url":null,"abstract":"It is a fact that mobile devices have emerged as the core interaction platforms for Human-to-Machine communication. Mixed Reality has reached mobile devices indeed. However, there are still issues regarding its consumption beyond stand-alone applications, such as Layar and Wikitude. This article states the benefits of consuming and integrating Mixed Reality with mobile services through our tailored Service Description Language. Finally, it describes our Mixed Reality-aware architecture for mobile environments and its validation.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extending Mesh Networks to Opportunistic Resource Sharing 将网状网络扩展到机会资源共享
J. Hansen
{"title":"Extending Mesh Networks to Opportunistic Resource Sharing","authors":"J. Hansen","doi":"10.1109/IMIS.2012.100","DOIUrl":"https://doi.org/10.1109/IMIS.2012.100","url":null,"abstract":"We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing \"web of trust\" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信