{"title":"SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks","authors":"Wenbo He, Ying Huang, K. Nahrstedt, W. C. Lee","doi":"10.1109/PERCOM.2007.32","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.32","url":null,"abstract":"Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be \"anywhere\", \"anytime\" and \"anyhow\". However, it is challenging to design a key management scheme in current wireless ad hoc networks to fulfill the required attributes of secure communications, such as data integrity, authentication, confidentiality, non-repudiation and service availability, when Sybil attacks are present. In this paper, we present a self-contained public key management scheme, called SMOCK, which is able to resist the Sybil attack, achieves zero communication overhead for authentication, and offers high service availability. In oar scheme, small number of cryptographic keys are stored off-line at individual nodes before they are deployed in the network. To provide good scalability in terms of number of nodes and storage space, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that SMOCK provides controllable resilience when malicious nodes break into a limited number of nodes before key revocation and renewal","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131006838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Local Data Abstraction and Communication Paradigm for Pervasive Computing","authors":"Sanem Kabadayi, C. Julien","doi":"10.1109/PERCOM.2007.2","DOIUrl":"https://doi.org/10.1109/PERCOM.2007.2","url":null,"abstract":"As sensor networks are increasingly used to support pervasive computing, we envision an instrumented environment that can provide varying amounts of information to mobile applications immersed within the network. Such a scenario deviates from existing deployments of sensor networks which are often highly application-specific and funnel information to a central collection point. We instead target scenarios in which multiple mobile applications will leverage sensor network nodes opportunistically and unpredictably. Such situations require new communication abstractions that enable immersed devices to interact directly with available sensors, reducing both communication overhead and data latency. This paper introduces scenes, which applications create based on their communication requirements, abstract properties of the underlying network communication, and properties of the physical environment. This paper reports on the communication model, an initial implementation, and its performance in varying scenarios","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing Applications","authors":"A. Schmidt, Lucia Terrenghi","doi":"10.1145/1141277.1141733","DOIUrl":"https://doi.org/10.1145/1141277.1141733","url":null,"abstract":"Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented that fit into people's lives. In particular we describe our experiments on how methods of user centered design and participatory design can be appropriated to find users' requirements and design ideas for ubiquitous computing applications for the home. In particular we focus in the study reported on information presentation using display appliances. In a participatory design process, enhanced with technology probes, we discussed potential solutions for a specific home with 14 participants individually. Based on these individual solutions, fitting a single persona each, we specified the prototypes that would accommodate the user's needs and that are generic in its applicability. This allows drawing a first set of guidelines for the design of display appliances in the home environment","PeriodicalId":314022,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}