2009 IEEE International Conference on Pervasive Computing and Communications最新文献

筛选
英文 中文
Securing body sensor networks: Sensor association and key management 保护身体传感器网络:传感器关联和密钥管理
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912756
S. Keoh, Emil C. Lupu, M. Sloman
{"title":"Securing body sensor networks: Sensor association and key management","authors":"S. Keoh, Emil C. Lupu, M. Sloman","doi":"10.1109/PERCOM.2009.4912756","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912756","url":null,"abstract":"Body Sensor Networks can be used to continuously monitor patients' health. However, secure association of sensors with the patient and key management for providing integrity and confidentiality to the sensor readings are essential. We propose a secure discovery protocol based on the synchronised LED blinking pattern, to enable healthcare workers to authorise the sensor-to-patient association. We also propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks and caters for group key update and re-keying to adapt to membership changes. These protocols have been implemented to demonstrate their feasibility and an initial performance evaluation is presented.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
epSICAR: An Emerging Patterns based approach to sequential, interleaved and Concurrent Activity Recognition epSICAR:一种基于模式的序列、交错和并发活动识别方法
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912776
Tao Gu, Zhanqing Wu, Xianping Tao, H. Pung, Jian Lu
{"title":"epSICAR: An Emerging Patterns based approach to sequential, interleaved and Concurrent Activity Recognition","authors":"Tao Gu, Zhanqing Wu, Xianping Tao, H. Pung, Jian Lu","doi":"10.1109/PERCOM.2009.4912776","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912776","url":null,"abstract":"Recognizing human activities from sensor readings has recently attracted much research interest in pervasive computing. This task is particularly challenging because human activities are often performed in not only a simple (i.e., sequential), but also a complex (i.e., interleaved and concurrent) manner in real life. In this paper, we propose a novel Emerging Patterns based approach to Sequential, Interleaved and Concurrent Activity Recognition (epSICAR). We exploit Emerging Patterns as powerful discriminators to differentiate activities. Different from other learning-based models built upon the training dataset for complex activities, we build our activity models by mining a set of Emerging Patterns from the sequential activity trace only and apply these models in recognizing sequential, interleaved and concurrent activities. We conduct our empirical studies in a real smart home, and the evaluation results demonstrate that with a time slice of 15 seconds, we achieve an accuracy of 90.96% for sequential activity, 87.98% for interleaved activity and 78.58% for concurrent activity.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132151319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 255
Encryption Key protection for Private Computing on Public Platforms 公共平台私有计算的加密密钥保护
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912897
Thomas H. Morris, S. Nair
{"title":"Encryption Key protection for Private Computing on Public Platforms","authors":"Thomas H. Morris, S. Nair","doi":"10.1109/PERCOM.2009.4912897","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912897","url":null,"abstract":"Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP must secure its encryption keys to ensure that application isolation is robust and reliable. To this end we offer a protection scheme for PCPP encryption keys. In this paper we first discuss a commonly used key storage mechanism, the Linux Key Retention Service (LKRS) and show a method for defeating this protection allowing one user to read the LKRS stored keys from another user's processes. We then describe our PCPP key protection methodology and how it interacts with the other PCPP building blocks to isolate encryption keys even from privileged users.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parasitic tracking: Enabling ubiquitous tracking through existing infrastructure 寄生跟踪:通过现有的基础设施实现无处不在的跟踪
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912810
Manuel J. Huber
{"title":"Parasitic tracking: Enabling ubiquitous tracking through existing infrastructure","authors":"Manuel J. Huber","doi":"10.1109/PERCOM.2009.4912810","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912810","url":null,"abstract":"For a mixed reality user the available tracking quality usually is a balance between technical requirements, user needs and economic factors, as most tracking methodologies require setup of dedicated infrastructure. As pervasive and ubiquitous computing grow in importance, so does the associated information infrastructure. Combining these two facts we present strategies to leverage existing information infrastructure and exploit its characteristics to empower users with services to determine their position, without the need for dedicated infrastructure.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the accuracy of RFID-based localization in a mobile wireless network testbed 移动无线网络试验台基于rfid的定位精度研究
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912872
Vikram P. Munishwar, Shailendra Singh, Xiaoshuang Wang, Christopher Mitchell, Kartik Gopalan, N. Abu-Ghazaleh
{"title":"On the accuracy of RFID-based localization in a mobile wireless network testbed","authors":"Vikram P. Munishwar, Shailendra Singh, Xiaoshuang Wang, Christopher Mitchell, Kartik Gopalan, N. Abu-Ghazaleh","doi":"10.1109/PERCOM.2009.4912872","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912872","url":null,"abstract":"The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network testbeds. A key component of MiNT-2 is the ability of testbed nodes to move around in the testbed space, whether to reconfigure the network topology or to emulate node mobility patterns. Consequently, we need to devise accurate mechanisms for node localization - the ability of a node to be aware of its exact location in the testbed space. This paper presents the details of the current RFID-based node localization mechanism in MiNT-2. We describe the sources of inaccuracy encountered when using RFID tags due to the error margin associated with the reading range of tags. We then present the implementation and evaluation of two approaches which can be combined to improve the overall accuracy of the RFID-based localization system. Through our experimental evaluation, we show that the proposed approaches improve the accuracy of RFID-based localization mechanisms by up to 58.22% for dense deployment of RFID tags. Though described in the context of the MiNT-2 testbed, our localization techniques are also applicable in more general settings where accurate and inexpensive positioning of mobile nodes is important.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Development of a location-aware speech control and audio feedback system 位置感知语音控制和音频反馈系统的开发
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912785
Lasse Kaila, Joonas Hyvönen, Markus Ritala, Ville Mäkinen, J. Vanhala
{"title":"Development of a location-aware speech control and audio feedback system","authors":"Lasse Kaila, Joonas Hyvönen, Markus Ritala, Ville Mäkinen, J. Vanhala","doi":"10.1109/PERCOM.2009.4912785","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912785","url":null,"abstract":"Speech is a natural form of interaction for people, and smart environments offer good possibilities for experimenting with new kinds of interaction with users and devices. Speech control can offer more intuitive and easy forms of interaction with the environment compared to traditional graphical or physical user interfaces. This paper describes the development, implementation and current ongoing work on a location-aware speech control and audio feedback user interface.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126904422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PSWare: A publish / subscribe middleware supporting composite event in wireless sensor network PSWare:在无线传感器网络中支持组合事件的发布/订阅中间件
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912862
S. Lai, Jiannong Cao, Yuan Zheng
{"title":"PSWare: A publish / subscribe middleware supporting composite event in wireless sensor network","authors":"S. Lai, Jiannong Cao, Yuan Zheng","doi":"10.1109/PERCOM.2009.4912862","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912862","url":null,"abstract":"Middleware for wireless sensor network (WSN) has been proposed as an effective solution to ease the application development by providing high-level abstractions. One of the important tasks of middleware in WSN is to support event service. As an important paradigm for event service, publish / subscribe (pub/sub) can support the asynchronous data exchange for applications and has received a lot of attention in traditional distributed systems. In WSNs, however, the design of pub/sub, especially on composite events, has not been adequately addressed. In this paper, we present the design and implementation of PSWare, a pub / sub middleware for WSN which can support both primitive and composite events. Our contribution mainly includes three parts. First, we propose an event definition language (EDL), which is specifically tailored to WSNs and can achieve high expressiveness and availability in the definition of primitive and composite events. The application programmers of PSWare can use the proposed EDL to define events in a simple manner. We implemented a compiler to compile the program written in EDL into byte codes. Second, we develop a runtime environment on sensor nodes, which provide a platform to run the compiled byte codes. Finally, we propose a composite event detection protocol to detect the events in an energy-efficient fashion.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
SmartShadow: Modeling a user-centric mobile virtual space SmartShadow:以用户为中心的移动虚拟空间建模
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912784
Li Zhang, Gang Pan, Zhaohui Wu, Shijian Li, Cho-Li Wang
{"title":"SmartShadow: Modeling a user-centric mobile virtual space","authors":"Li Zhang, Gang Pan, Zhaohui Wu, Shijian Li, Cho-Li Wang","doi":"10.1109/PERCOM.2009.4912784","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912784","url":null,"abstract":"This paper attempts to model pervasive computing environments as a user-centric “SmartShadow” using the BDP (Belief-Desire-Plan) user model, which maps pervasive computing environments into a dynamic virtual user space. SmartShadow will follow the user to provide him with pervasive services, just like his shadow in the physical world. In the BDP model, desires of a user are inferred from his belief set, and plans are made to satisfy each desire. Pervasive service is introduced to describe computing resources in the cyberspace, which can be organized by the user's BDP to accomplish his desires. The composition process maps pervasive services into a user's SmartShadow. The model is logically natural and simple, and can flexibly model dynamics of pervasive computing spaces. In addition, we implement a simulation system to verify and evaluate the SmartShadow model.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) model for pervasive environments 面向普适环境的自适应初始信任和需求感知安全资源发现(AID-SRD)模型
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912896
Md. Endadul Hoque, F. Rahman, Sheikh Iqbal Ahamed
{"title":"An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) model for pervasive environments","authors":"Md. Endadul Hoque, F. Rahman, Sheikh Iqbal Ahamed","doi":"10.1109/PERCOM.2009.4912896","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912896","url":null,"abstract":"Traditional computer systems and small distributed networks rely on users' authentication to provide security. However, this strategy is extremely inadequate for the increased flexibility of pervasive environments, where users join and leave frequently. Here, users want to discover services dynamically and share them safely taking into account some constraints such as limited computational power and decentralized management. In this paper, we propose a solution to this using a secure resource discovery model. Most of the prior research works on resource discovery assume a constant initial trust value because assignment of initial trust is a critical issue. Even in pervasive smart space, some service sharing may need high security. The level of service security therefore needs to be incorporated in initial trust assignment. In this paper, we present an Adaptive Initial trust and Demand aware Secure Resource Discovery (AID-SRD) model for pervasive environment. We incorporate a Demand Unit in AID-SRD which enables efficient resource sharing with unknown devices. AIDSRD also assigns initial trust considering the variable security need of different services.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115205681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and optimization of spatial organizations for context exchange and surveillance 环境交换和监视的空间组织的设计和优化
2009 IEEE International Conference on Pervasive Computing and Communications Pub Date : 2009-03-09 DOI: 10.1109/PERCOM.2009.4912891
A. Ziotopoulos, G. Veciana
{"title":"Design and optimization of spatial organizations for context exchange and surveillance","authors":"A. Ziotopoulos, G. Veciana","doi":"10.1109/PERCOM.2009.4912891","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912891","url":null,"abstract":"Modern environments have huge quantities of contextual information that is mainly relevant/useful when a user/mobile is situated at particular locations. This paper investigates organizations for exchanging localized context and surveilling the corresponding areas that minimize bandwidth/energy requirements. We propose a simple model where context is associated with spatial regions, cells, and is transferred to/from mobiles as their trajectories traverse the cells. Key elements of the model are the granularity (e.g., area) of the cells and the amount of context associated with each cell. The model uses random tessellations to generate spatial partitions of the space into cells of varying granularity, and an associated context content function to capture possible ways in which contextual data associated with a cell might scale. We discuss a simple taxonomy for such scalings giving a crude idea of how representative applications might behave. Based on this model we analyze optimal flat aggregative and hierarchical organizations for mediating context exchange revealing some fundamental principles relating the optimal granularity of cells to different types of applications' spatial content scaling.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信