Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)最新文献

筛选
英文 中文
Physically Unclonable Function-Based Security and Privacy in RFID Systems 基于物理不可克隆功能的RFID系统安全性和隐私性
L. Bolotnyy, G. Robins
{"title":"Physically Unclonable Function-Based Security and Privacy in RFID Systems","authors":"L. Bolotnyy, G. Robins","doi":"10.1109/PERCOM.2007.26","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.26","url":null,"abstract":"Radio frequency identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised many privacy and security concerns. On the other hand, known privacy and security cryptographic defenses are too hardware-expensive to incorporate into low-cost RFID tags. In this paper, we propose hardware-based approaches to RFID security that rely on physically unclonable functions (PUFs). These functions exploit the inherent variability of wire delays and parasitic gate delays in manufactured circuits, and may be implemented with an order-of-magnitude reduction in gate count as compared with traditional cryptographic functions. We describe protocols for privacy-preserving tag identification and secure message authentication codes. We compare PUFs to digital cryptographic functions, address other uses of PUFs to enhance RFID security and suggest interesting directions for future research. The proposed solutions are efficient, practical, and appropriate for low-cost RFID systems","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 211
An RF-Based System for Tracking Transceiver-Free Objects 一种基于射频的无收发器目标跟踪系统
Dian Zhang, Jian Ma, Quanbin Chen, L. Ni
{"title":"An RF-Based System for Tracking Transceiver-Free Objects","authors":"Dian Zhang, Jian Ma, Quanbin Chen, L. Ni","doi":"10.1109/PERCOM.2007.8","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.8","url":null,"abstract":"In traditional radio-based localization methods, the target object has to carry a transmitter (e.g., active RFID), a receiver (e.g., 802.11x detector), or a transceiver (e.g., sensor node). However, in some applications, such as safe guard systems, it is not possible to meet this precondition. In this paper, we propose a model of signal dynamics to allow tracking of transceiver-free objects. Based on radio signal strength indicator (RSSI), which is readily available in wireless communication, three tracking algorithms are proposed to eliminate noise behaviors and improve accuracy. The midpoint and intersection algorithms can be applied to track a single object without calibration, while the best-cover algorithm has potential to track multiple objects but requires calibration. Our experimental test-bed is a grid sensor array based on MICA2 sensor nodes. The experimental results show that the best side length between sensor nodes in the grid is 2 meters and the best-cover algorithm can reach localization accuracy to 0.99 m","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 265
The SkyLoc Floor Localization System SkyLoc楼层定位系统
Alex Varshavsky, A. LaMarca, Jeffrey Hightower, E. D. Lara
{"title":"The SkyLoc Floor Localization System","authors":"Alex Varshavsky, A. LaMarca, Jeffrey Hightower, E. D. Lara","doi":"10.1109/PERCOM.2007.37","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.37","url":null,"abstract":"When a mobile user dials 911, a key to arriving to the emergency scene promptly is knowing the location of the mobile user. This paper presents SkyLoc, a GSM fingerprinting-based localization system that runs on a mobile phone and identifies the current floor of a user in tall multi-floor buildings. Knowing the floor in a tall building significantly reduces the area that emergency service personnel have to canvas to locate the individuals in need. We evaluated our system in three multi-floor buildings located in Washington DC, Seattle and Toronto. Our system identifies the floor correctly in up to 73% of the cases and is within 2 floors in 97% of the cases. The system is robust as it works for different network operators, when the training and testing sets were collected with different hardware and up to one month apart. In addition, we show that feature selection techniques that select a subset of highly relevant radio sources for fingerprint matching nearly double the localization accuracy of our system","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
SHAD: A Human-Centered Security Architecture for the Plan B Operating System 以人为本的B计划操作系统安全架构
Enrique Soriano, Francisco J. Ballesteros, Gorka Guardiola
{"title":"SHAD: A Human-Centered Security Architecture for the Plan B Operating System","authors":"Enrique Soriano, Francisco J. Ballesteros, Gorka Guardiola","doi":"10.1109/PERCOM.2007.31","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.31","url":null,"abstract":"This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a peer-to-peer and human-centered security architecture. It is based in a general purpose personal device that manages the user's security: the UbiTerm. There are several other systems that, at first sight, seem to provide single sign-on in ubiquitous environments. We argue that they fail to do so in practice, and that SHAD offers for the first time a real SSO that works well in ubiquitous environments that require using multiple machines and services simultaneously. SHAD permits users to share their resources in an easy, natural, and intuitive way, even while being disconnected from the rest of the world. The architecture we propose is able to exploit context information, when it is available. It does not require hard administration tasks, and permits users to manage their own resources. We have been using SHAD for one year. This paper describes our prototype implementation, the experience using it, and some measures that confirm that our approach is reasonable in practice","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"104 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Supporting Mobile Service Usage through Physical Mobile Interaction 通过移动物理交互支持移动业务使用
G. Broll, Sven Siorpaes, E. Rukzio, M. Paolucci, J. Hamard, M. Wagner, A. Schmidt
{"title":"Supporting Mobile Service Usage through Physical Mobile Interaction","authors":"G. Broll, Sven Siorpaes, E. Rukzio, M. Paolucci, J. Hamard, M. Wagner, A. Schmidt","doi":"10.1109/PERCOM.2007.35","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.35","url":null,"abstract":"Although mobile services can be used ubiquitously, their employment and the interaction with them are still restricted by the constraints of mobile devices. In order to facilitate and leverage mobile interaction with services, we present a generic framework that combines semantic Web service technology and physical mobile interaction. This interaction paradigm uses mobile devices to extract information from augmented physical objects and use it for a more intuitive and convenient invocation of associated services. For that purpose, the presented framework exploits Web service descriptions for the automatic and dynamic generation of customizable user interfaces that support and facilitate physical mobile interaction. This generic approach to mobile interaction with services through the interaction with physical objects promises to meet the complementary development of the Internet of things. A user study with a prototype application for mobile ticketing confirms our concept and shows its limits","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Designing Ubiquitous Computing Systems for Sports Equipment 运动器材普适计算系统设计
M. Kranz, W. Spießl, A. Schmidt
{"title":"Designing Ubiquitous Computing Systems for Sports Equipment","authors":"M. Kranz, W. Spießl, A. Schmidt","doi":"10.1109/PERCOM.2007.12","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.12","url":null,"abstract":"In this paper, we report on a user-centered, iterative design process for augmenting sports equipment with ubiquitous computing technology. In several design iterations, a fully working system for training and physiotherapy has been developed and deployed using hard- and software components of ubiquitous computing technology. We report on the design and development process that led to this system. Based on our experience we generalize the specific processes to general ubicomp systems. The validity of our approach has been verified by a larger user study","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Achieving Flexible Cache Consistency for Pervasive Internet Access 为普及互联网接入实现灵活的缓存一致性
Yu Huang, Jiannong Cao, Zhijun Wang, Beihong Jin, Yulin Feng
{"title":"Achieving Flexible Cache Consistency for Pervasive Internet Access","authors":"Yu Huang, Jiannong Cao, Zhijun Wang, Beihong Jin, Yulin Feng","doi":"10.1109/PERCOM.2007.6","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.6","url":null,"abstract":"Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing environments, especially with ad hoc networks, users are in great need of the flexibility in tuning their consistency requirements, in order to make tradeoffs between the specified cache consistency and the cost incurred. Existing works have used delta consistency (DC) and probabilistic consistency (PC) which, to some extent, provide the users with such flexibility. In this paper, we propose a general consistency model called probabilistic delta consistency (PDC). PDC covers all existing consistency models including DC and PC, and integrates the flexibility granted by both DC and PC. Thus, PDC enables the users to flexibly specify their consistency requirements in two orthogonal dimensions, namely the deviation in time/value and the ratio of queries gaining the specified consistency. We also propose a consistency maintenance algorithm, called flexible combination of push and pull (FCPP), which can meet users' consistency requirements specified under the PDC model. An analytical model is derived to achieve the optimized combination of push and pull, so as to ensure the user-specified consistency requirements, while minimizing the consistency maintenance overhead. Extensive simulations are conducted to evaluate the performance of the FCPP algorithm. Evaluation results show that, compared with the widely used dynamic TTR algorithm, FCPP can save up to 68% of the traffic overhead and reduce the query delay by up to 84%","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124354728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A Simple Model and Infrastructure for Context-Aware Browsing of the World 上下文感知浏览世界的简单模型和基础结构
G. Castelli, A. Rosi, M. Mamei, F. Zambonelli
{"title":"A Simple Model and Infrastructure for Context-Aware Browsing of the World","authors":"G. Castelli, A. Rosi, M. Mamei, F. Zambonelli","doi":"10.1109/PERCOM.2007.4","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.4","url":null,"abstract":"The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding geo-located information within tools such as Google Earth, will soon make available an incredible amount of information about the physical and social worlds and their processes. This opens up the possibility of exploiting all such information for the provisioning of pervasive context-aware services for \"browsing the world\", i.e., for facilitating users in gathering information about the world, interacting with it, and understanding it. However, for this to occur, proper models and infrastructures must be developed. In this paper we propose a simple model for the representation of contextual information, the design and implementation of a general infrastructure for browsing the world, as well as some exemplar services we have implemented over it","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Automatic Generation of Device User-Interfaces? 自动生成设备用户界面?
O. Omojokun, P. Dewan
{"title":"Automatic Generation of Device User-Interfaces?","authors":"O. Omojokun, P. Dewan","doi":"10.1109/PERCOM.2007.10","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.10","url":null,"abstract":"One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: should the user-interfaces of these devices be handcrafted manually or generated automatically? Based on experience within the domain of desktop computing, the answer seems to be that automatic generation is not flexible enough to support a significant number of useful interfaces but requires substantially less coding effort for the interfaces it can create. We show that the answer is much more complicated when we consider networking of traditional appliances such as stereos and TVs. Using qualitative arguments and quantitative experimental data, we show that the manual vs. generated issue must be resolved based on: (a) not only user-interface programming and flexibility but also several other metrics such as space and time costs, binding time, and reliability (b) whether it is a graphical or speech based user-interface, (c) the size of the device user-interface, (d) whether the manually written user-interface code is available at the mobile computer or at a remote machine, and (e) the network bandwidth between the mobile computer and remote factory","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121446495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Structural Learning of Activities from Sparse Datasets 稀疏数据集中活动的结构学习
F. Albinali, N. Davies, A. Friday
{"title":"Structural Learning of Activities from Sparse Datasets","authors":"F. Albinali, N. Davies, A. Friday","doi":"10.1109/PERCOM.2007.33","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.33","url":null,"abstract":"A major challenge in pervasive computing is to develop systems that can reliably recognize human activity patterns, such as bathing from sensor data. Typical sensor deployments generate sparse datasets with thousands of sensor readings and few instances of activities. The imbalance between the number of features (i.e. sensors firing) and the classification targets (i.e. activities) complicates the learning process. In this paper, we propose a novel framework for discovering relationships between sensor signals and observed human activities from sparse datasets. The framework builds on the use of Bayesian networks for modeling activities by representing statistical dependencies between sensors. This allows us to solve two key problems: firstly, how to automatically determine an effective structure for a Bayesian network that recognizes a particular activity without human intervention; and, secondly, we address the pragmatic problem of sparse training data, where the data available to train the activity recognizers is limited. In our approach, we `learn' the structure of the Bayesian networks automatically from the sensor data. We optimize this process in 3 ways: firstly, we perform multicollinearity analysis to focus on orthogonal sensor data with minimal redundancy. Secondly, we propose Efron's bootstrapping to generate large training sets that capture important features of an activity. Finally, we find the best Bayesian network that explains our data using a heuristic search that is unbiased to the ordering between consecutive variables. We evaluate our approach using a data set gathered from MIT's PlaceLab. The inferred networks correctly identify activities for 85% of the time","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信