{"title":"Worst-Case Routing Performance Metrics for Sensor Networks","authors":"E. Soedarmadji","doi":"10.1109/PERCOMW.2007.139","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.139","url":null,"abstract":"Successful integration of pervasive sensor networks in mission critical applications depends on the ability of these networks to cope with and reasonably perform under the worst-case scenarios. One of the key performance measures is the network's ability to route information from the source node to the intended destination. This paper introduces a general framework with which worst-case routing performance of sensor networks can be evaluated and compared. Ultimately, our method can either be used as a design optimization tool, or a decision making tool to select and price contending sensor network designs","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Animesh Pathak, L. Mottola, A. Bakshi, V. Prasanna, G. Picco
{"title":"Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming","authors":"Animesh Pathak, L. Mottola, A. Bakshi, V. Prasanna, G. Picco","doi":"10.1109/PERCOMW.2007.46","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.46","url":null,"abstract":"Wireless sensor networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the real world. So far, pervasive applications for WSNs have been developed in an ad-hoc manner using node-centric programming models, focusing on the behavior of single nodes. Instead, macro-programming models provide much higher levels of abstractions, allowing developers to reason on the sensor network as a whole. In this paper, we demonstrate how a wide range of interaction patterns commonly found in pervasive, embedded applications can be expressed using ATaG, a data-driven macro-programming language. To support this, we showcase real-world applications developed in ATaG, and consider both homogeneous, sense-only scenarios, and heterogeneous settings involving actuation on the environment under control","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115575827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Broens, M. V. Sinderen, A. V. Halteren, D. Quartel
{"title":"Dynamic Context Bindings in Pervasive Middleware","authors":"T. Broens, M. V. Sinderen, A. V. Halteren, D. Quartel","doi":"10.1109/PERCOMW.2007.42","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.42","url":null,"abstract":"Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usage and management of context. However, using context requires the CA application to create a binding between itself and one or more context producing entities. Creating this binding is the responsibility of the CA application developer, which is often an extensive manual task. The ad hoc availability of context-producing entities further complicates this responsibility. This paper proposes an application infrastructure, coined CACI, which offers a binding transparency to support rapid development of CA applications. CACI enables developers to specify context requirements at a high abstraction level using a declarative binding language. CACI also provides the creation and maintenance of bindings to context producing entities based on such specifications. This paper discusses the design and implementation of CACI. Additionally, it discusses the validation of CACI using a pervasive healthcare scenario","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems","authors":"C. Duffy, U. Roedig, J. Herbert, C. Sreenan","doi":"10.1109/PERCOMW.2007.21","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.21","url":null,"abstract":"Two different operating system types are currently considered for sensor networks: event driven and multi-threaded. This paper compares the two well-known operating systems TinyOS (event driven) and MANTIS (multi-threaded) regarding their memory usage, power consumption and processing capabilities. TinyOS and MANTIS are both ported to the DSYS25 sensor platform. Both operating systems are used to execute the same sensor network application and the aforementioned parameters of interest are measured. The results presented in this paper show for which set of applications each operating system is preferable","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Two Lightweight RFID Authentication Schemes","authors":"Benessa Defend, Kevin Fu, A. Juels","doi":"10.1109/PERCOMW.2007.34","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.34","url":null,"abstract":"Vajda and Buttyan proposed several lightweight authentication protocols for authenticating RFID tags to readers, and left open the quantifiable cryptographic strength. Our cryptanalysis answers this open question by implementing and measuring attacks against their XOR and SUBSET protocols. A passive eavesdropper can impersonate a tag in the XOR protocol after observing only 70 challenge-response transactions between the tag and reader. In contrast, the theoretical maximum strength of the XOR protocol could have required 16! * 2 observed transactions to break the key. Our experiments also show that a passive eavesdropper can recover the shared secret used in the XOR protocol by observing an expected 1,092 transactions. Additionally, a nearly optimal active attack against the SUBSET protocol extracts almost one bit of information for each bit emitted by the tag","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks","authors":"Michael Gregoire, I. Koren","doi":"10.1109/PERCOMW.2007.20","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.20","url":null,"abstract":"A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best route, or routes, from data source to sink before sending the data. We propose an algorithm that works with this chosen route to increase the probability of data reaching the sink node in the presence of communication failures. This is done using an algorithm that watches radio activity to detect when faults occur and then takes actions at the point of failure to re-route the data through a different node without starting over on an alternative path from the source. We show that we are able to increase the percentage of data received at the source node without increasing the energy consumption of the network beyond a reasonable level","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130604398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Probabilistic Schemes in Multisensor Context-Awareness","authors":"W. Dargie","doi":"10.1109/PERCOMW.2007.115","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.115","url":null,"abstract":"This paper investigates the role of existing \"probabilistic\" schemes to reason about various everyday situations on the basis of data from multiple heterogeneous physical sensors. The schemes we discuss are fuzzy logic, hidden Markov models, Bayesian networks, and Dempster-Schafer theory of evidence. The paper also presents a conceptual architecture and identifies the suitable scheme to be employed by each component of the architecture. As a proof-of-concept, we will introduce the architecture we implemented to model various places on the basis of data from temperature, light intensity and relative humidity sensors","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-Hak Song, SangKwon Moon, Gyudong Shim, D. Park
{"title":"mu-ware: A Middleware Framework for Wearable Computer and Ubiquitous Computing Environment","authors":"Yong-Hak Song, SangKwon Moon, Gyudong Shim, D. Park","doi":"10.1109/PERCOMW.2007.2","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.2","url":null,"abstract":"We expect that futuristic wearable computers including our UFC (ubiquitous fashionable computer) will spread like current prosperous PC in the near future. With the wearable computer on their body, users utilize their own private computing environment wherever they are. Moreover, using the wearable computer, they are able to interact with a variety of user-centric services provided by ubiquitous computing infrastructure (U-infra). In this paper, we focus on our proposed extensible middleware, U-ware, for both user's UFC and U-infra which is managed by ubiquitous service providers, mu-ware is composed of light-weight service discovery protocol (USD protocol), distributed information sharing (Ubispace), context manager and instant service loader on our extensible middleware platform, called KUSP. mu-ware not only provides upper applications with an efficient stand-alone computing environment but also helps them easily take advantage of various ubiquitous services, even new services in a first-visited place","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martin Saternus, Torben Weis, Mirko Knoll, Frank Dürr
{"title":"A Middleware for Context-Aware Applications and Services Based on Messenger Protocols","authors":"Martin Saternus, Torben Weis, Mirko Knoll, Frank Dürr","doi":"10.1109/PERCOMW.2007.7","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.7","url":null,"abstract":"Nowadays most context-aware applications are independent proprietary pieces of software. A general framework or middleware deployed in the field does not exist; therefore the implementation of context-aware applications and services assumes the development of the whole application stack for each application. Along these development issues, deployment and privacy problems are to be solved. This imposes the following challenges concerning a middleware for context-aware applications: (1) we need an architecture that allows to implement and deploy services easily on the network. (2) We need a user interface that is widespread, well known to users and allows to manage one's privacy settings for every single service transparently. In this paper we describe our middleware's architecture for context-aware applications, based on messenger protocols","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware Support for Quality of Context in Pervasive Context-Aware Systems","authors":"K. Sheikh, M. Wegdam, M. V. Sinderen","doi":"10.1109/PERCOMW.2007.81","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.81","url":null,"abstract":"Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisition, aggregation, reasoning and distribution. The middleware decouples applications from the underlying heterogeneous context sensors, and offers advantages such as rapid development of context-aware applications and efficient usage of the context sensors. Context sensors have inherent limitations with respect to the quality of the context information they produce. Without breaking the decoupling, the middleware needs to explicitly model and quantify this quality of context in order to allow application to adapt their behavior based on the quality of context, for efficiency reasons and to enable quality-of-context-aware privacy policies. In this paper we identify and define five quality-of-context indicators for context-aware middleware, and discuss different alternatives for their quantification. These quality-of-context indicators are: precision, freshness, spatial resolution, temporal resolution and probability of correctness","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}