{"title":"EB-MAC: An event based medium access control for wireless sensor networks","authors":"Z. Merhi, M. Elgamel, M. Bayoumi","doi":"10.1109/PERCOM.2009.4912863","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912863","url":null,"abstract":"Efficiency in any wireless sensor based application relies significantly on the medium access control it implements. It is not likely that we will see in the near future a unified MAC protocol for wireless sensor networks that is suitable for all wireless sensor applications. In this context, we propose an event based medium access control (EB-MAC) that is tailored for event based systems. Typically, event based systems are characterized by having long periods of inactivity and short abrupt periods of high data contention when an event is detected. High data traffic is generated simultaneously from all sensors detecting the event to deliver captured data. EB-MAC arranges data transfer dynamically using an election based scheduling technique. When data transfer begins, each sensor at a time starts sending data packets in a contention free environment. The protocol is implemented on MicaZ sensor motes where it showed efficiency in reliability, throughput and energy conservation. The algorithm is compared with an implementation of B-MAC with RTS/CTS on MicaZ where it showed its superiority in throughput and latency.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Costa, Felipe Kellermann, Rodolfo Stoffel Antunes, L. Silva, A. Yamin, C. Geyer
{"title":"Continuum: A service-based software infrastructure for ubiquitous computing","authors":"C. Costa, Felipe Kellermann, Rodolfo Stoffel Antunes, L. Silva, A. Yamin, C. Geyer","doi":"10.1109/PERCOM.2009.4912790","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912790","url":null,"abstract":"The latest technological advances, which introduced innovative and more affordable devices, have contributed to boost the practical application of research in the field of ubiquitous computing (ubicomp). For the development of applications in this area, we need an adequate software infrastructure. In order to do so, we have proposed Continuum, an infrastructure based on service-oriented architecture (SOA), making use of framework and middleware, and employing a redefinition of follow-me semantics. In this redefined vision, users can go anywhere carrying the data and application they want, which they can use in a seamlessly integrated fashion with the real world. In this article, we focus on the description of the service-based architecture proposed for Continuum. The proposal widens the web services standards to support the mobility of services, allowing them to be deployed, copied, or moved. Besides, the abstraction provided enables the adaptation of legacy applications as Continuum pluggable services.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131165534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proximiter: Enabling mobile proximity-based content sharing on portable devices","authors":"Bo Xing, K. Seada, N. Venkatasubramanian","doi":"10.1109/PERCOM.2009.4912802","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912802","url":null,"abstract":"The recent years have witnessed an explosive amount of user-generated contents, along with users' soaring demands on sharing these contents. An evidence of that is the blossom of hundreds of sharing sites on the web, among which the most famous are MySpace [1], Flickr [2], YouTube [3], Facebook [4] and LinkedIn [5]. Through these sites, users upload the contents they generate (blogs, pictures, videos, resumes, etc.), and make them available to their friends or the general public. A common characteristic of such Internet-based content sharing scenarios is that all contents are hosted by third-party servers on the Internet, and sharing happens when content consumers (regardless of where they are) access the hosting web sites.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung Wook Park, Y. Jung, H. Park, Soon-Dong Kim, W. Cho
{"title":"WIS : A well-being index based health care system in smart home","authors":"Jung Wook Park, Y. Jung, H. Park, Soon-Dong Kim, W. Cho","doi":"10.1109/PERCOM.2009.4912804","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912804","url":null,"abstract":"In this paper, we present a health care system which can diagnose chronic diseases such as metabolic syndrome. In case of chronic invalids health information has to be check periodically, causing major inconvenience to the patient. In this paper, we propose an automatic diagnostic method for detecting metabolic syndrome, by utilizing a collaborative community computing approach in conjunction with a well-being index.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using situation lattices in sensor analysis","authors":"Juan Ye, Lorcan Coyle, S. Dobson, P. Nixon","doi":"10.1109/PERCOM.2009.4912762","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912762","url":null,"abstract":"Highly sensorised systems present two parallel challenges: how to design a sensor suite that can efficiently and cost-effectively support the needs of given services; and to extract the semantically relevant interpretations, or “situations”, from the flood of context data collected by the sensors. We describe mathematical structures called situation lattices that can be used to address these two problems simultaneously, allowing designers to both design and refine situation identification whilst offering insights into the design of sensor suites. We validate the accuracy and efficiency of our technique against a third-party data set and demonstrate how it can be used to evaluate sensor suite designs.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomizing RFID private authentication","authors":"Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiangyang Li, Yunhao Liu","doi":"10.1109/PERCOM.2009.4912773","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912773","url":null,"abstract":"Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization. Indeed, these attacks may still take effect even after a tag successfully finishes the authentication and key-updating procedure. To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept. RWP also provides the forward security and temporal resistance to the tracking attack. The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. You, D. Lieckfeldt, Qi Han, J. Salzmann, D. Timmermann
{"title":"Look-ahead geographic routing for sensor networks","authors":"J. You, D. Lieckfeldt, Qi Han, J. Salzmann, D. Timmermann","doi":"10.1109/PERCOM.2009.4912859","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912859","url":null,"abstract":"As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Voids in networks often cause existing geographic routing algorithms to fail. In this paper, we propose a novel geographic routing algorithm called “Greedy Forwarding with VIrtual Position (ViP)”. We introduce virtual position as the middle position of all direct neighbors of a node. Instead of comparing nodes' real geographic positions, ViP employs virtual positions when selecting the next hop. Such virtual position reflects the neighborhood of a sensor node, as well as the tendency of further forwarding. For sparsely-deployed networks, ViP increases success rate of packet routing without introducing significant overhead. Furthermore, multiple levels of virtual position can be obtained with localized iteration. We propose the “Greedy Forwarding with Multi-level Virtual Position (MVP)” algorithm and the “Greedy Forwarding with Hierarchical Virtual Position (HVP)” algorithm. Different levels of virtual positions and their combinations are used alternatively to increase success rate of packet routing in sensor networks.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the event-based programming model to support sensor-driven ubiquitous computing applications","authors":"Sean Reilly, M. Haahr","doi":"10.1109/PERCOM.2009.4912849","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912849","url":null,"abstract":"We propose an extension to the event-based programming model for sensor-driven ubiquitous computing applications. The extension consists of three abstractions: Multi-Event Handlers, Event Streams and Execution Policies. We believe that these additional abstractions simplify the task of writing applications in this domain. In this position paper we present the extensions and demonstrate our prototype middleware implemented in C.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pebbles and Urns a tangible, presence-based messaging service","authors":"William O. Plymale","doi":"10.1109/PERCOM.2009.4912813","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912813","url":null,"abstract":"The incorporation of contextual elements of location, time, and identity into traditional computer and network systems and services is resulting in enhanced, intuitive, more natural user experiences. This work defines an instance of a presence-based messaging system called Pebbles and Urns. A survey of current messaging systems has indicated key missing elements that are addressed by functionality in the Pebbles and Urns architecture. Current context-based messaging research focuses on the social activities and social interactions of the user. While that is important, this work proposes how Pebbles and Urns would augment the numerous ways a person deploys, obtains, and realizes information in their daily activities. Next, it considers agent design and tuplespaces as implementation components of Pebbles and Urns. An agent's ability to react to context, combined with tuplespace characteristics of distributed, associative memory, persistent storage, and destination - space - time uncoupling allow the investigation of new messaging schemes offering interesting advantages over existing messaging systems. This work closes with several Pebbles and Urns user scenarios and suggested future work to extend the Pebbles and Urns messaging system.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130143814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vikram P. Munishwar, Shailendra Singh, Christopher Mitchell, Xiaoshuang Wang, Kartik Gopalan, N. Abu-Ghazaleh
{"title":"RFID based localization for a miniaturized robotic platform for wireless protocols evaluation","authors":"Vikram P. Munishwar, Shailendra Singh, Christopher Mitchell, Xiaoshuang Wang, Kartik Gopalan, N. Abu-Ghazaleh","doi":"10.1109/PERCOM.2009.4912794","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912794","url":null,"abstract":"The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world settings. We proposed MiNT-2, a fresh re-design of the original MiNT framework developed at Stony Brook University. One of the fundamental requirements of MiNT-2 is to provide location awareness of all the nodes within the network. In this paper, we demonstrate the use of radio-frequency identification (RFID) technology in order to carry out localization of the mobile nodes within the system. We also demonstrate the application of the localization system of constructing different scenarios for wireless protocols evaluation.","PeriodicalId":322416,"journal":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}