K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye
{"title":"High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication","authors":"K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye","doi":"10.1109/IMIS.2014.70","DOIUrl":"https://doi.org/10.1109/IMIS.2014.70","url":null,"abstract":"Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata
{"title":"Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster Use","authors":"Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/IMIS.2014.18","DOIUrl":"https://doi.org/10.1109/IMIS.2014.18","url":null,"abstract":"Many cities or towns are located in mountain and sea areas, and these areas would be isolated from others because of the disconnection of networks or transportation if a large scale disaster should happen. In this paper, Delay Tolerant Networking (DTN) based on the Data Triage Method with the user policies and the Autonomous Flight Wireless Nodes (AFW) based on autonomous flights and data deliveries are introduced. In the proposed system, the drone with wireless interfaces is applied, and it actively supports the proposed DTN routings for the Disaster Information System (DIS). That is, the AFW automatically flies for seeking possible wireless nodes, send and receive disaster information by the proposed DTN routings, and return to the possible stations that wireless charge units are equipped when the battery needs to charge. Then, the implementations and the field experiments are discussed for the effectiveness of the proposed methods.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Vulnerability of Ghost Domain Names","authors":"Hiroaki Kikuchi, Tomohiro Arimizu","doi":"10.1109/IMIS.2014.87","DOIUrl":"https://doi.org/10.1109/IMIS.2014.87","url":null,"abstract":"We study the vulnerability in domain name system, so called as \"Ghost domain names\", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester
{"title":"Flexible, Direct Interactions between CoAP-enabled IoT Devices","authors":"Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester","doi":"10.1109/IMIS.2014.42","DOIUrl":"https://doi.org/10.1109/IMIS.2014.42","url":null,"abstract":"The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things philosophy where everything is interconnected, direct interactions between sensors and actuators, also called bindings, are important. In this paper, we introduce a CoAP based sensor/actuator binding solution where a 3rd party is responsible for setting up the binding, but is not involved in any of the further interactions between the sensor and actuator. As binding creation and execution is fully based on Restful CoAP interactions, very flexible bindings between any two devices can be created. We implemented this solution in Contiki and evaluated the implementation by taking different measures such as delay, memory footprint, and packet size.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.19","DOIUrl":"https://doi.org/10.1109/IMIS.2014.19","url":null,"abstract":"In next-generation mobile networks (NGWNs), seamless service for users and handoffs between heterogeneous networks must be taken into account. In this paper, we propose a seamless proxy-based handoff scheme using the PMIPv6-based proxy model, which is able to improve the performance of handoffs in sensor-based mobile networks. Our scheme can efficiently support IP-based seamless mobility by reducing the search process. The performance results show that our proposed scheme outperforms the existing schemes in terms of Quality of Service (QoS), including such factors as throughput, handoff latency, packet loss, and signaling overhead.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing","authors":"M. Migliardi, A. Merlo, L. Caviglione","doi":"10.1109/IMIS.2014.30","DOIUrl":"https://doi.org/10.1109/IMIS.2014.30","url":null,"abstract":"Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered momentum and has seen many interesting developments in some of its different declinations. In this paper we will analyze some of the most recent evolutions and we will summarize the current state of the art describing some of the most interesting and promising advancements. More in details, we will focus on i) energy management in network nodes, ii) exploitation of security mechanisms to save energy and iii) use of energy consumption as a marker for malicious activities in energy constrained computational platforms.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System to Enable Level-of-Detail Mobile Interaction with Augmented Media Objects","authors":"David Gómez, A. Bernardos, J. Casar","doi":"10.1109/IMIS.2014.47","DOIUrl":"https://doi.org/10.1109/IMIS.2014.47","url":null,"abstract":"This paper presents a service concept that enables the virtual augmentation of physical objects through a mobile device. Each object is linked to a tree of virtual resources (e.g. digital contents). Resources are organized in levels-of-detail that depend on the user's distance and orientation towards the object itself (i.e. user's attitude). The root node of the content tree hosts a set of items that can be retrieved from the most distant position to the object, each depth level in the tree is associated to the observer's attitude towards the object, thus the structure facilitates 'spatial browsing' of information. On this concept, we have implemented an indoor sensor-based Augmented Reality system that relies on a RFID positioning mat for positioning. To complete the attitude calculation and to adjust the service interface, we have handled typical indoor problems such as compass calibration and its bias management. The service has been instantiated to augment a TV set to spatially browse geography contents, the content tree is organized in continent, country and city levels and delivers synchronized resources to the mobile interface and to the TV, depending on the user's attitude and its previous interactions. Results of a limited user test show that the service concept is acceptable to the users and underline the need to get better control of resources representation. Although the chosen object for demonstration is a media one, the concept is applicable to any kind of object.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP","authors":"I. Lin, Yun-Sheng Yen, Fang-Yie Leu","doi":"10.1109/IMIS.2014.74","DOIUrl":"https://doi.org/10.1109/IMIS.2014.74","url":null,"abstract":"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \"integrity\", \"consistency\" and \"precision\" of the digital evidences.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128350568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Measuring Document Similarity for Movie Recommendation","authors":"Sung-min Kim, Young-guk Ha","doi":"10.1109/IMIS.2014.5","DOIUrl":"https://doi.org/10.1109/IMIS.2014.5","url":null,"abstract":"One of good ways for a person to find a movie the person would like is, supposedly, to find a movie that is similar to other movies that the person found interesting before. For those who like to find movies in this way, there are a few websites where users can search for similar movies to a certain movie. Recommendation systems of such websites rely on rating information or experts' analysis which take a lot of time and efforts of humans to get. This paper suggests a method for scoring similarity among movies using movie scripts. The method we suggest doesn't need any rating information or metadata to analyze. Instead of using those kinds of information, our method is about measuring similarities among documents. There are several conventional methods for the purpose, but it is based on matching keywords. To overcome the limit of matching keywords directly, our method compares two documents in an indirect way.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im
{"title":"Threats and Countermeasures on a 4G Mobile Network","authors":"Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im","doi":"10.1109/IMIS.2014.79","DOIUrl":"https://doi.org/10.1109/IMIS.2014.79","url":null,"abstract":"The appearance of high performance smartphones and increasing mobile services, enabled by the advancement of mobile phones and mobile communication technology, changed the mobile communication network architecture from a closed type to open type. In the open type network, anyone can access the network and various attacks and abnormal traffic can penetrate it, but existing IP based security technologies cannot block them. Particularly, there is no technology to detect the protocols such as GTP (GPRS Tunneling Protocol) specialized to the mobile communication network in the high volume traffic processing environment in the 4G mobile network. This paper describes the various types of threats to 4G mobile networks and measures to cope with them.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}