2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication 基于三方认证的高效多密钥交换协议
K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye
{"title":"High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication","authors":"K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye","doi":"10.1109/IMIS.2014.70","DOIUrl":"https://doi.org/10.1109/IMIS.2014.70","url":null,"abstract":"Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster Use 基于容延迟网络的自主飞行无线节点灾害应用研究
Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata
{"title":"Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster Use","authors":"Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/IMIS.2014.18","DOIUrl":"https://doi.org/10.1109/IMIS.2014.18","url":null,"abstract":"Many cities or towns are located in mountain and sea areas, and these areas would be isolated from others because of the disconnection of networks or transportation if a large scale disaster should happen. In this paper, Delay Tolerant Networking (DTN) based on the Data Triage Method with the user policies and the Autonomous Flight Wireless Nodes (AFW) based on autonomous flights and data deliveries are introduced. In the proposed system, the drone with wireless interfaces is applied, and it actively supports the proposed DTN routings for the Disaster Information System (DIS). That is, the AFW automatically flies for seeking possible wireless nodes, send and receive disaster information by the proposed DTN routings, and return to the possible stations that wireless charge units are equipped when the battery needs to charge. Then, the implementations and the field experiments are discussed for the effectiveness of the proposed methods.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the Vulnerability of Ghost Domain Names
Hiroaki Kikuchi, Tomohiro Arimizu
{"title":"On the Vulnerability of Ghost Domain Names","authors":"Hiroaki Kikuchi, Tomohiro Arimizu","doi":"10.1109/IMIS.2014.87","DOIUrl":"https://doi.org/10.1109/IMIS.2014.87","url":null,"abstract":"We study the vulnerability in domain name system, so called as \"Ghost domain names\", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Flexible, Direct Interactions between CoAP-enabled IoT Devices 支持coap的物联网设备之间灵活、直接的交互
Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester
{"title":"Flexible, Direct Interactions between CoAP-enabled IoT Devices","authors":"Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester","doi":"10.1109/IMIS.2014.42","DOIUrl":"https://doi.org/10.1109/IMIS.2014.42","url":null,"abstract":"The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things philosophy where everything is interconnected, direct interactions between sensors and actuators, also called bindings, are important. In this paper, we introduce a CoAP based sensor/actuator binding solution where a 3rd party is responsible for setting up the binding, but is not involved in any of the further interactions between the sensor and actuator. As binding creation and execution is fully based on Restful CoAP interactions, very flexible bindings between any two devices can be created. We implemented this solution in Contiki and evaluated the implementation by taking different measures such as delay, memory footprint, and packet size.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks 基于spmipv6的下一代移动网络无缝切换方案
Chulhee Cho, Jun-Dong Cho, Jongpil Jeong
{"title":"Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.19","DOIUrl":"https://doi.org/10.1109/IMIS.2014.19","url":null,"abstract":"In next-generation mobile networks (NGWNs), seamless service for users and handoffs between heterogeneous networks must be taken into account. In this paper, we propose a seamless proxy-based handoff scheme using the PMIPv6-based proxy model, which is able to improve the performance of handoffs in sensor-based mobile networks. Our scheme can efficiently support IP-based seamless mobility by reducing the search process. The performance results show that our proposed scheme outperforms the existing schemes in terms of Quality of Service (QoS), including such factors as throughput, handoff latency, packet loss, and signaling overhead.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 绿色,能源意识安全的调查及其在网络和移动计算方面的一些最新发展
M. Migliardi, A. Merlo, L. Caviglione
{"title":"A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing","authors":"M. Migliardi, A. Merlo, L. Caviglione","doi":"10.1109/IMIS.2014.30","DOIUrl":"https://doi.org/10.1109/IMIS.2014.30","url":null,"abstract":"Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered momentum and has seen many interesting developments in some of its different declinations. In this paper we will analyze some of the most recent evolutions and we will summarize the current state of the art describing some of the most interesting and promising advancements. More in details, we will focus on i) energy management in network nodes, ii) exploitation of security mechanisms to save energy and iii) use of energy consumption as a marker for malicious activities in energy constrained computational platforms.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A System to Enable Level-of-Detail Mobile Interaction with Augmented Media Objects 一种能够与增强媒体对象进行细节级移动交互的系统
David Gómez, A. Bernardos, J. Casar
{"title":"A System to Enable Level-of-Detail Mobile Interaction with Augmented Media Objects","authors":"David Gómez, A. Bernardos, J. Casar","doi":"10.1109/IMIS.2014.47","DOIUrl":"https://doi.org/10.1109/IMIS.2014.47","url":null,"abstract":"This paper presents a service concept that enables the virtual augmentation of physical objects through a mobile device. Each object is linked to a tree of virtual resources (e.g. digital contents). Resources are organized in levels-of-detail that depend on the user's distance and orientation towards the object itself (i.e. user's attitude). The root node of the content tree hosts a set of items that can be retrieved from the most distant position to the object, each depth level in the tree is associated to the observer's attitude towards the object, thus the structure facilitates 'spatial browsing' of information. On this concept, we have implemented an indoor sensor-based Augmented Reality system that relies on a RFID positioning mat for positioning. To complete the attitude calculation and to adjust the service interface, we have handled typical indoor problems such as compass calibration and its bias management. The service has been instantiated to augment a TV set to spatially browse geography contents, the content tree is organized in continent, country and city levels and delivers synchronized resources to the mobile interface and to the TV, depending on the user's attitude and its previous interactions. Results of a limited user test show that the service concept is acceptable to the users and underline the need to get better control of resources representation. Although the chosen object for demonstration is a media one, the concept is applicable to any kind of object.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP DEFSOP、NIST Cell SOP、ISO27037 SOP的比较分析研究
I. Lin, Yun-Sheng Yen, Fang-Yie Leu
{"title":"Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP","authors":"I. Lin, Yun-Sheng Yen, Fang-Yie Leu","doi":"10.1109/IMIS.2014.74","DOIUrl":"https://doi.org/10.1109/IMIS.2014.74","url":null,"abstract":"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \"integrity\", \"consistency\" and \"precision\" of the digital evidences.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128350568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Method of Measuring Document Similarity for Movie Recommendation 一种新的电影推荐文档相似度度量方法
Sung-min Kim, Young-guk Ha
{"title":"A New Method of Measuring Document Similarity for Movie Recommendation","authors":"Sung-min Kim, Young-guk Ha","doi":"10.1109/IMIS.2014.5","DOIUrl":"https://doi.org/10.1109/IMIS.2014.5","url":null,"abstract":"One of good ways for a person to find a movie the person would like is, supposedly, to find a movie that is similar to other movies that the person found interesting before. For those who like to find movies in this way, there are a few websites where users can search for similar movies to a certain movie. Recommendation systems of such websites rely on rating information or experts' analysis which take a lot of time and efforts of humans to get. This paper suggests a method for scoring similarity among movies using movie scripts. The method we suggest doesn't need any rating information or metadata to analyze. Instead of using those kinds of information, our method is about measuring similarities among documents. There are several conventional methods for the purpose, but it is based on matching keywords. To overcome the limit of matching keywords directly, our method compares two documents in an indirect way.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threats and Countermeasures on a 4G Mobile Network 4G移动网络的威胁与对策
Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im
{"title":"Threats and Countermeasures on a 4G Mobile Network","authors":"Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im","doi":"10.1109/IMIS.2014.79","DOIUrl":"https://doi.org/10.1109/IMIS.2014.79","url":null,"abstract":"The appearance of high performance smartphones and increasing mobile services, enabled by the advancement of mobile phones and mobile communication technology, changed the mobile communication network architecture from a closed type to open type. In the open type network, anyone can access the network and various attacks and abnormal traffic can penetrate it, but existing IP based security technologies cannot block them. Particularly, there is no technology to detect the protocols such as GTP (GPRS Tunneling Protocol) specialized to the mobile communication network in the high volume traffic processing environment in the 4G mobile network. This paper describes the various types of threats to 4G mobile networks and measures to cope with them.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信