{"title":"Facilitating RFID Development with the Accada Prototyping Platform","authors":"C. Floerkemeier, M. Lampe, C. Roduner","doi":"10.1109/PERCOMW.2007.47","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.47","url":null,"abstract":"The proliferation of radiofrequency identification systems in application domains such as supply chain management requires an IT infrastructure that provides RFID device and data management and supports application development. In this paper, we discuss the requirements towards such an infrastructure and present the freely available Accada RFID prototyping platform. The Accada platform manages readers, filters and aggregates RFID data, and helps to interpret the captured RFID data in an application context. Our RFID infrastructure implements the specifications defined by the EPCglobal RFID community, such as the reader protocol, the application-level-events specification and the EPCIS capture and query interfaces. We believe that this freely available RFID infrastructure will allow the research community to evaluate novel concepts and applications more quickly by significantly lowering the barrier for large-scale, real-world testing","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Good Manners for Pervasive Computing--An Approach Based on the Ambient Calculus","authors":"Gregor Schiele, M. Handte, C. Becker","doi":"10.1109/PERCOMW.2007.53","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.53","url":null,"abstract":"When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on the milieu - or ambience - people are acting in. People breaking the codex are either considered badly educated or foreigners to the ambience - sometimes even both. In pervasive computing a multitude of applications is expected to populate our environment and to follow objects and users throughout their daily journey. Consequently, we will need a new codex or manners - for pervasive computing applications that controls the interaction between applications. Such a codex will have to incorporate our existing codices as well as technical aspects. In this work in progress paper we present an approach to extend our prior work on pervasive computing system support by specifying interdependencies of applications based on the ambient calculus. This allows specifying and technically enforcing \"manners\" for pervasive computing applications","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Mainstreaming of Mobile Learning at a German University","authors":"N. Döring","doi":"10.1109/PERCOMW.2007.114","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.114","url":null,"abstract":"Mobile learning scenarios are often restricted to - mostly short-lived funded pilot projects and pilot institutions outside the scope of mainstream educational methods and institutions. To overcome the marginal status of m-learning, in 2006 we established a mainstreaming team at our university (Ilmenau University of Technology in Germany) with the objective of identifying, implementing and evaluating mainstream-suitable m-learning scenarios. We thoroughly researched and documented available m-learning solutions, defined mainstreaming criteria and initiated student-/teacher-centered scenario design processes. The evaluation data from the first project phase indicate that the cell phone cardbox trainer and the interactive notebook revision lecture are useful m-learning scenarios with mainstream potential","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"17 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Dimensional Bar-Code Decoding with Camera-Equipped Mobile Phones","authors":"T. Falas, Hossein Kashani","doi":"10.1109/PERCOMW.2007.119","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.119","url":null,"abstract":"Data entry for mobile phones has always been limited by the phone's numeric keypad. One way to overcome this is through two-dimensional bar-codes read by the phone's camera. This paper presents two-dimensional bar-code reading using camera phones. Bar-code reading applications use the phone's camera to capture an image of a bar-code, and then use the phone's processor for decoding. They have been mostly developed in native code for a limited number of phone platforms. In contrast, development for Java-enabled phones allows bar-code reading regardless of the phone manufacturer and/or platform. It is argued that Java is a viable alternative if software is carefully crafted. A review of attempts in the use of mobile phones as bar-code readers, and a novel implementation of this technology, with very promising results, are presented","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"44 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility","authors":"T. Spyropoulos, K. Psounis, C. Raghavendra","doi":"10.1109/PERCOMW.2007.108","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.108","url":null,"abstract":"Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks (VANETs), etc. To deal with such networks researchers have suggested to use controlled replication or \"spraying \" methods that can reduce the overhead of flooding-based schemes by distributing a small number of copies to only a few relays. These relays then \"look\" for the destination in parallel as they move into the network. Although such schemes can perform well in scenarios with high mobility (e.g. VANETs), they struggle in situations were mobility is slow and correlated in space and/or time. To route messages efficiently in such networks, we propose a scheme that also distributes a small number of copies to few relays. However, each relay can then forward its copy further using a single-copy utility-based scheme, instead of naively waiting to deliver it to the destination itself. This scheme exploits all the advantages of controlled replication, but is also able to identify appropriate forwarding opportunities that could deliver the message faster. Simulation results for traditional mobility models, as well as for a more realistic \"community-based\" model, indicate that our scheme can reduce the delay of existing spraying techniques up to 20 times in some scenarios","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117277815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Open Source Toolkit for Ubiquitous Device Authentication","authors":"R. Mayrhofer","doi":"10.1109/PERCOMW.2007.118","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.118","url":null,"abstract":"Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due to the diversity of requirements, protocols tend to be implemented within specific research prototypes and can not be used easily in other applications. We propose to develop a common toolkit for ubiquitous device authentication to foster wide usability of research results. This paper outlines design goals and presents a first, freely available implementation","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125099329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment","authors":"D. Ahmed, S. Shirmohammadi","doi":"10.1109/PERCOMW.2007.82","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.82","url":null,"abstract":"Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile P2P has revealed its attraction. But, the resource constraints such as bandwidth, computing power, energy, etc. and node's mobility give hard challenges to the researchers. Smart content distribution and efficient content discovery are the heart of P2P protocols. Routing is associated with every task but it is expensive in ad hoc environment. In this paper, we address these issues and present a peer-to-peer system for wireless ad-hoc networks using multi-level hashing to reduce routing overhead. The necessity of multilevel hashing is justified through extensive simulation","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Evaluation of Ontology-Based Context Reasoning","authors":"A. Agostini, C. Bettini, Daniele Riboni","doi":"10.1109/PERCOMW.2007.10","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.10","url":null,"abstract":"The CARE middleware aims at supporting context-aware adaptation of Internet services in a mobile computing environment. The CARE hybrid reasoning mechanism is based on a loose interaction between ontological reasoning and efficient reasoning in a restricted logic programming language. In this paper we report recent experimental results on ontology-based context reasoning that support the hybrid approach","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
{"title":"Public-Key Cryptography for RFID-Tags","authors":"L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede","doi":"10.1109/PERCOMW.2007.98","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.98","url":null,"abstract":"RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for anti-counterfeiting by embedding them into a product. Public-key cryptography (PKC) offers an attractive solution to the counterfeiting problem but whether a publickey cryptosystem can be implemented on an RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols are useful for these anti-counterfeiting applications. We also discuss the feasibility of identification protocols based on elliptic curve cryptography (ECC) and show that it is feasible on RFID tags. Finally, we compare different implementation options and explore the cost that side-channel attack countermeasures would have on such implementations","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Broadcast Based Ad Hoc Routing Protocols","authors":"Matthias Ganzinger, William J. Hymas, T. Schutt","doi":"10.1109/PERCOMW.2007.104","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.104","url":null,"abstract":"Security, particularly integrity and confidentiality, is a prerequisite for using mobile ad hoc networks (MANETs) in sensitive or hostile environments. Existing MANET routing protocols, however, are commonly not designed to ensure, that only authorized nodes can join the MANET. The topology of the MANET and potential points of attack are revealed to (unauthorized) listeners if control messages are sent unencrypted. We propose a modification of the optimized link state routing (OLSR) protocol. In a reference implementation we replaced OLSR's broadcast messages with a set of unicast messages. To provide peer access and control in the mobile environment we issued certificates to all participating nodes and used these for mutual authentication. Additionally, we encrypted all OLSR messages using Internet protocol security (IPsec). This method adds additional traffic to the network. We discuss the complexity of our approach and estimate network parameters for which the impact can be considered tolerable","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"497 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124636528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}